Member-only story
The Hacker Methodology Tryhackme Writeup
This is a Writeup of Tryhackme room “The Hacker Methodology”
Room link: https://tryhackme.com/room/hackermethodology
Note: This room is free
What process does a Hacker follow?
While you might think that a hacker does whatever he/she wants, it is actually true that professional hackers/penetration tester generally follow an established process to understand and exploit their targets. This ensures that there is consistency between how assessments are performed throughout the industry, and is the methodology that drives assessments.
The Process that pentesters follow is summarized in the following steps:
- Reconnaissance
- Enumeration/Scanning
- Gaining Access
- Privilege Escalation
- Covering Tracks
- Reporting
In the next sections we will go through each aspect of this process in more detail.
Answer the question below to continue.
Q.1 What is the first phase of the Hacker Methodology?
Answer: Reconnaissance