Pentest_Notes

πŸ—ΊοΈ Master Penetration Testing Methodology Checklist

Domain-agnostic, phase-by-phase penetration testing methodology. Last Updated: 2026-03-27


Pre-Engagement


Phase 1: Reconnaissance / Information Gathering

Passive Reconnaissance

Active Reconnaissance


Phase 2: Enumeration

Network Enumeration

Service-Specific Enumeration

Active Directory Enumeration (if applicable)


Phase 3: Vulnerability Assessment


Phase 4: Exploitation


Phase 5: Post-Exploitation

Immediate Actions After Shell

Credential Harvesting

Privilege Escalation

Lateral Movement

Pivoting


Phase 6: Objectives Completion


Phase 7: Cleanup & Reporting


Tool Readiness Checklist

Must-Have Tools Installed

Category Tools
Scanning Nmap, Masscan, Rustscan
Web Feroxbuster, Gobuster, Nikto, Nuclei, Burp Suite Pro, SQLMap, wfuzz
AD BloodHound, SharpHound, RustHound, Kerbrute, Rubeus, Mimikatz, PowerView, BloodyAD, Certipy-AD
Credential Hashcat, John, Hydra, CrackMapExec/NetExec, Responder
Pivoting Ligolo-ng, Chisel, SSHuttle
PrivEsc LinPEAS, WinPEAS, Seatbelt, PowerUp, pspy
Shells rlwrap, nc/ncat, Metasploit, Sliver, Villain
Enumeration enum4linux, ldapsearch, rpcclient, snmpwalk, smbclient
Recon subfinder, theHarvester, httpx, whatweb, Katana
Misc tmux, Obsidian/CherryTree, Python3, impacket suite

Pre-Engagement Verification


Post-Exploitation Checklist (Consolidated)

Linux Post-Exploitation

Windows Post-Exploitation