Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Here we’re listing out the quick cheatsheet and commands of all pen test phases. 1) Reconnaissance: Normally no active tests are performed on targets. At this phase google is […]