Penetration Testing

Anatomy of a Pentest

I stumbled across this great “living” document that I’m calling an “Anatomy of a Pentest”.  It is a great visual representation of all the steps one should think about when performing a pentest, with all of the most handy command line switches.  The author is taking feedback from the community on the document, and is updating it accordingly.

I just need to find someone with a plotter to print a couple of copies. 

– Larry

Anatomy of a Pentest

Larry Pesce

A self-professed, lifelong “tinkerer and explorer,” Larry always wanted to know how things work. “I found myself getting to engage in deep dives of technology from an early age: My dad built the family television from a kit, and I helped. It caught fire. Twice. I helped fix it both times.”

The help and advice received from the infosec community throughout his career inspired him to share what he had learned to help others secure their networks and improve their craft. Part of that ongoing sharing has been as the co-founder and co-host of the international award winning Paul’s Security Weekly podcast for more than 19 years.

Larry has spent the last 15 years as a penetration tester, spending lots of time focused on Healthcare, ICS/OT, Wireless, and IoT/IIoT/Embedded Devices, but now focuses his efforts on securing the software supply chain at Finite State.

Related Events

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.