Introduction

This book is a personal notebook containing information I collected during my journey to become more familar with Penetration Teting.

The book follows a strucured approach that is based on the Certified Ethical Hacker (CEH) methodology with some smaller adjustments to have a clear seperation between the Active Reconnaissance, Passive Reconnaissance and Scanning & Enumeraton.

The chapter Phase 1 - Reconnaissance will only contain passive resonnaissance steps, with one exception: visiting a targets website.

Active Reconnaissace steps will be covered within the chapter Phase 2 - Scanning and Enumeration.

results matching ""

    No results matching ""