Start with Information & enumeration
- IP
- Ports
- OS
- Services & Applications
- Explore the web application.
- Search for vulnerabilities in the known services & application
- Brute force SSH with common & weak credentials.
Host Discovery
- Enumeration and Service Discovery
- Vulnerability Assessment and Analysis
- Web Application Penetration Testing
- Infrastructure Penetration and Privilege Escalation
- Post Exploitation