| type | index | |||
|---|---|---|---|---|
| title | Pentesting SOPs | |||
| description | Master offensive security: penetration testing SOPs covering web apps, AD, mobile, Linux, forensics, bug bounty & detection evasion techniques. | |||
| tags |
|
|||
| template_version | 2025-10-11 |
This directory contains Standard Operating Procedures (SOPs) for penetration testing across various domains and platforms.
- [[sop-linux-pentest|Linux Pentesting]]
- [[sop-ad-pentest|Active Directory Pentesting]]
- [[sop-cloud-pentest|Cloud Pentesting (AWS/Azure/GCP)]]
- [[sop-container-k8s-pentest|Container & Kubernetes Pentesting]]
- [[sop-web-application-security|Web Application Security]]
- [[sop-mobile-security|Mobile Security Testing]]
- [[sop-firmware-reverse-engineering|Firmware Reverse Engineering]]
- [[sop-wireless-rf-pentest|Wireless & RF Pentesting]]
- [[sop-vulnerability-research|Vulnerability Research]]
- [[sop-bug-bounty|Bug Bounty Methodology]]
- [[sop-detection-evasion-testing|Detection Evasion Testing]]
- [[sop-forensics-investigation|Forensics Investigation]]
These SOPs provide standardized procedures for:
- Conducting security assessments and penetration tests
- Identifying and exploiting vulnerabilities
- Testing security controls and defensive measures
- Researching new vulnerabilities and attack techniques
- [[sop-web-application-security|Web Application Security]] - OWASP Top 10
- [[sop-bug-bounty|Bug Bounty]] - For responsible disclosure
- [[sop-vulnerability-research|Vulnerability Research]] - For novel vulnerabilities
- [[sop-linux-pentest|Linux Pentesting]] - Unix/Linux systems
- [[sop-ad-pentest|Active Directory Pentesting]] - Windows environments
- [[sop-detection-evasion-testing|Detection Evasion]] - Bypassing defenses
- [[sop-mobile-security|Mobile Security]] - iOS/Android applications
- [[sop-firmware-reverse-engineering|Firmware RE]] - IoT and embedded devices
- [[sop-vulnerability-research|Vulnerability Research]] - For exploit development
- [[sop-detection-evasion-testing|Detection Evasion]] - Maintaining access
- [[sop-forensics-investigation|Forensics Investigation]] - Evidence collection
- Return to [[../../README|Start]]
- See also: [[Security/Analysis/Analysis-Index|Analysis SOPs]]