My scanning methodology
Pentest Preparation Steps
1. Initialize Metasploit
Start the Metasploit database: Ensure the database is running.
Check database status: Use the command
db_status
to verify connectivity.
2. Prepare Target and Exclusion Lists
Create a Target File: List all targeted IPs in a file (e.g.,
target.txt
).Create an Exclusion File: Specify any IPs to exclude in a separate file (e.g.,
exclude.txt
).
3. Conduct Network Scans
Scan for Live Hosts:
Service Detection and Script Scanning:
Use Additional Vulnerability Scripts:
4. Identify and Document Live Hosts
Create a Documentation File: Record the live hosts identified during the scan in a separate file (e.g.,
live_hosts.txt
).
Last updated