1 00:00:00,180 --> 00:00:04,830 In this lecture, we are going to see what is the practical testing methodology. 2 00:00:05,400 --> 00:00:11,880 When testing methodology refers to a specific course of action taken step by step by a fantastic provider 3 00:00:11,880 --> 00:00:18,750 to conduct testing of a target website or a network, there are multiple testing methodologies that 4 00:00:18,750 --> 00:00:22,410 can be put to use depending on the category of a target business. 5 00:00:22,860 --> 00:00:25,320 The goal of the protester and its scope. 6 00:00:25,860 --> 00:00:31,020 However, most of the testing methodologies are related and include some similar steps. 7 00:00:31,320 --> 00:00:34,530 For example, we start with scanning and enumeration. 8 00:00:34,530 --> 00:00:36,900 Then we do the vulnerability assessment. 9 00:00:37,290 --> 00:00:40,320 What are the exploits that we can use against the target? 10 00:00:40,800 --> 00:00:43,080 Then we actually exploit the target. 11 00:00:43,110 --> 00:00:48,360 Then in the post exploitation section, we try to gather more information about the target network and 12 00:00:48,360 --> 00:00:49,110 the system. 13 00:00:49,920 --> 00:00:52,140 I try to elevate our privileges. 14 00:00:52,260 --> 00:00:54,870 We also tried to hide presence in this module. 15 00:00:54,900 --> 00:01:00,840 So once you are actually going for an attack or a practical clandestine, you should follow some methodological 16 00:01:00,840 --> 00:01:02,880 approach to get better results. 17 00:01:05,230 --> 00:01:08,170 We are going to see these deaths one by one in the future. 18 00:01:08,170 --> 00:01:08,950 Lectures.