My scanning methodology
Information gathering phase
1. Initialize Metasploit
2. Prepare Target and Exclusion Lists
3. Conduct Network Scans
db_nmap -sP -iL target.txt --excludefile exclude.txt -oA discoverydb_nmap -sS -sV -sC -T4 -iL target2.txtdb_nmap -Pn -sS -sV -sC -T4 -A --script=vuln* -iL target2.txt
4. Identify and Document Live Hosts
5. Use a screenshot capturing tool to automatically capture screenshots of live hosts from list of identified livehosts
Last updated