Here's how it flows.
Prepare for the project. Select an appropriate strategy, set realistic timelines, outline limitations, agree on deliverables.
Dig for useful data and information both directly and indirectly to help you understand your target and map attack vectors.
Execute broad automated and manual scans that will check for thousands of vulnerabilities across all open ports.
Take advantage of previously confirmed vulnerabilities to gain access to sensitive data.
Use a risk-based approach to outline all findings of security vulnerabilities.
Complete the minor remaining tasks so you can move onto an engagement.
Members helping to educate people across the Caribbean about Penetration Testing.
Apply, get vetted, join the group and start working together to publish educational content.