Table of Contents
Penetration Test Methodology
1: Reconnaissance/Discovery
2: Enumeration: Gain more information with intrusive methods.
3: Vulnerability Analysis: Map the environment profile to known vulnerabilities.
4: Execution: Attempt to gain user and privileged access.
5: Document Findings: Document the results of the test.

