Further reading
- The Cyber Kill Chain – https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
- MITRE ATT&CK tactics – https://attack.mitre.org/tactics/enterprise/
- Penetration Testing Execution Standard (PTES) – http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
- Payment Card Industry Data Security Standard (PCI DSS) – https://www.pcisecuritystandards.org/documents/Penetration-Testing-Guidance-v1_1.pdf
- Penetration Testing Framework (PTF) – http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
- Technical Guide to Information Security Testing and Assessment – https://csrc.nist.gov/publications/detail/sp/800-115/final
- Open Source Security Testing Methodology Manual – https://www.isecom.org/OSSTMM.3.pdf
- OWASP Web Security Testing Guide – https://owasp.org/www-project-web-security-testing-guide/
- OWASP Mobile Security Testing Guide – https://owasp.org/www-project-mobile-app-security/
- OWASP Firmware Security Testing Methodology – https://github.com/scriptingxss/owasp-fstm
Join our community on Discord
Join our community’s Discord space for discussions with the author and other readers: