🧑‍🎓
ejpt.ferqwerty.com
More Courses
  • eJPT
    • Penetration Testing Basics
      • Information Gathering
      • Footprinting & Scanning
      • Vulnerability Assessment
      • Web Attacks
      • System Attacks
      • Network Attacks
    • Preliminary Skills & Programming
      • C++
      • Python
      • Bash Shell
      • Windows Shell
    • Penetration Testing Prerequisites
      • Introduction
      • Networking
      • Web Applications
    • ⬛Black Box Tests
      • Black Box Test #1
      • Black Box Test #2
      • Black Box Test #3
    • 🔗References
    • 📑Glossary
  • Other Courses
    • eCPPTv2
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. eJPT

Penetration Testing Basics

Techniques, tools, and a professional penetration testing methodology.

  • Good vs Bad penetration tester.

  • Darts example: better 1000 shots at a microscopic target or single shot to an impossible to miss big target?

  • Cyclic process.

  • Every information gathering stage will need the same focus and dedication as the first one.

  • Your penetration test will be as strong as your weakest skill!

  • First and one of the most crucial phases of an engagement.

  • A penetration tester cannot leave any stone unturned.

Study and get updated, new exploitation techniques are being discovered daily, start a blog, read feeds.

PreviouseJPTNextInformation Gathering

Last updated 3 years ago

Was this helpful?