Skip to content

Latest commit

 

History

History
8 lines (7 loc) · 527 Bytes

File metadata and controls

8 lines (7 loc) · 527 Bytes

📜 Protocols and Services

Before moving forward, you should have (at least) performed the following steps:

  1. Information Gathering: to gain as much knowledge as possible about the target, maximizing your chances of success.
  2. Port Scanning: to enumerate open ports, os version and running services versions.
  3. Looking for Known Exploits: by googling, searching in metasploit, exploit-db, and other vulnerability databases.
  4. Attempting to Login: by using the service's default credentials.