birds eye view

external penetration  testing

In many cases you will find yourself doing the follwoing steps over and over again.

That doesn’t mean that its boring.

It just means there is a certain methodology you follow.

Of course depending on the scope of your pen test you might not do every step.

When you investigated all this and gathered all that information it is all about finding a clever way to use that info to create an attack vector and then use the right tools to execute it.

learn and share

while we learn and gain more experience we take notes – obviously.

Instead of keeping them private to us we share them here.

Most of the content here will assume you know how things work in general – you just need some reminder how this tool or that protocol works.

If that sounds good to you – dive right in.

Click me!