There are no articles in this category. If subcategories display on this page, they may have articles.


Penetration testing may involve many different types of methodologies or frameworks, here I will be concentrating on the PTES (Penetration Testing Execution Standard) where it applies to different information systems. Everything described here is and has been documented previously in the wild (online).