📖
Notes
Search...
Ctrl + K
CyberSecurity
Penetration Testing
TryHackMe
Main Methodology
1. Reconnaissance
2. Enumeration/Scanning
3. Gaining Access / Exploitation
4. Post Exploitation
5. Covering Tracks
6. Reporting
Previous
TryHackMe
Next
1. Reconnaissance
Last updated
1 year ago