External Pentest
Type of External Pentest
Rules of engagement
Verify scope
Step 1
Step 2
Subdomain Finders
Using Google Dork
Subdomain tools
Vuln Scan
OSINT
Hunting breach credentials
Identifying Emails & Employees
Enumerating valid accounts
Other useful info
How to check a host OS
Attack login portals
O365
OWA (Outlook Web Access)
Other portals
Bypassing MFA
Escalating Access
Common pentest findings
Insufficient Authentication Controls
Weak Password Policy
Insufficient Patching
Default Credentials
Insufficient Encryption
Information Disclosure
Username Enumeration
Default Web Pages
Open Mail Relay
IKE Aggressive Mode
Unexpected Perimeter Services
Insufficient Traffic Blocking
Undetected Malicious Activity
Historical Account Compromises
Resources
Last updated




