Write summary reports of exploited machines on HackTheBox
Pentesting Cycle:
- Gain information about target
- Mapping network
- Vulnerability assessment
- Exploit (Web application, Network, System)
- Priveledge Escalation (Root access)
Optional:
- Gaining foothold (Establish stable connection to victim machine via ssh keys, ...)
- Post exploitation (gain valueable information)