10 steps of Kali Linux Penetration Testing cycles

figure1.1 Kali Linux pentesting Cycle

Target scoping

Target scoping is the first step in kali Linux pentesting cycle, in this step we need to determine the action that we are going to take on the network, how long will the penetration testing will take, and the target of the pentesting.

Information Gathering

Gather and learn about the target from public sources like a search engine. it is also possible to get more detailed information through tools like whois.com and other footprinting tools.

Target discovery

in this step, we mostly deal with identifying target’s network status, OS, and network architecture.

Enumerating target

Target enumerating may include username enumerating, port enumerating and password enumerating.

Vulnerability mapping

The steps where the vulnerability assessment is created.

Social Engineering (optional)

Exploiting human errors to get useful information related to the target.

Target exploitation

In this step, real exploitation is done. This step focused on the target acquisition process that has three core area, includes :

pre-exploitation

exploitation

post-exploitation activities

privilege escalation

in this step usually, the attempt to get higher access to the system is done.

maintaining access

Keeping target under controls and Provides a  clear view of how an attacker maintains access without noisy behavior.

documentation and reporting

Documenting, reporting, and presenting the vulnerabilities found.

 

Leave a Reply

Your email address will not be published. Required fields are marked *