⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Methodology
Initial access/Exploitation
1
Input form
SQLi, etc...
2
File upload
upload web shell, .etc..
3
Previous
Reconnaissance/Enumeration
Next
Post exploitation/Privilege escalation
Last updated
22 hours ago