
上QQ阅读APP看书,第一时间看更新
Penetration Testing Execution Standard (PTES)
This standard is the most widely used standard and covers almost everything related to the pen test.
PTES is divided into seven phases:
- Pre-engagement interactions
- Intelligence gathering
- Threat modeling
- Vulnerability analysis
- Exploitation
- Post exploitation
- Reporting
Let’s take a brief look at what each of these phases involves.