The Penetration Testing Execution Standard Logo

The Penetration Testing Execution Standard

0
Free
Visit Website

The penetration testing execution standard consists of seven main sections, covering everything related to a penetration test, from initial communication to reporting. The standard is divided into seven main sections: 1. Introduction and Planning 2. Intelligence Gathering and Threat Modeling 3. Vulnerability Research 4. Exploitation and Post-Exploitation 5. Reporting This version can be considered a v1.0, with a v2.0 in the works, providing more granular work in terms of 'levels' - as in intensity levels at which each of the elements of a penetration test can be performed at.

FEATURES

ALTERNATIVES

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

A framework for exploiting Android-based devices and applications

A tool for Local File Inclusion (LFI) exploitation and scanning

A Linux-based environment for penetration testing and vulnerability exploitation

A Ruby framework designed to aid in the penetration testing of WordPress systems.

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

PINNED