From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding the ethical hacking and bug hunting methodology

Understanding the ethical hacking and bug hunting methodology

From the course: Complete Guide to Cybersecurity: A Practical Approach

Understanding the ethical hacking and bug hunting methodology

- [Instructor] Let's go over the different hacking methodologies that exist in the industry. The first one that I would like to make you aware is the penetration testing execution standard. And as a matter of fact, all these links are in my GitHub repository, which you of course, you're familiar with, and you can find it in the bottom of the screen here. But this pen testing execution standard is a community-driven methodology or effort. It actually goes over the different steps in a pen testing engagement from pre-engagement interactions, all the way to reporting. There's another technical guide or methodology by NIST, and that is actually defined in the National Institute of Standards and Technology, Special Publication 800-115. And it's basically titled the Technical Guide to Information Security Testing and Assessment. These are high-level recommendations from NIST on how to perform an assessment or testing in, whether it's a web application, an infrastructure hardware, and so on.…

Contents