⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Methodology
to split into sections
Reconnaissance/Enumeration
Initial access/Exploitation
Post exploitation/Privilege escalation
Previous
Request Smuggling
Next
to split into sections