⚔️AI Security Arena
ArenaHistoryLeaderboardNewsPricing
Navigation
DashboardArena
Battles
Match HistoryReplay ViewerLeaderboard
Learn
Security FundamentalsPentestingCloud SecurityPrompt TrainingArchitecture
Knowledge
Security NewsPricingResourcesCompliance
Community

Pentesting Methodology

Follow the six phases of a professional penetration test from recon to report

6phases · Sequential methodology
1

Reconnaissance

Click to expand

Gather information about the target without direct interaction (passive) or through direct probing (active). This phase builds the attack surface map that guides all subsequent phases.

2

Scanning & Enumeration

Click to expand

Actively probe the target to discover open ports, running services, software versions, and potential vulnerabilities. This transforms reconnaissance data into actionable attack vectors.

3

Gaining Access

Click to expand

Exploit discovered vulnerabilities to gain initial access to target systems. This includes leveraging software flaws, misconfigurations, and social engineering to establish a foothold.

4

Maintaining Access

Click to expand

Establish persistence and escalate privileges to maintain long-term access. This simulates how real attackers create backdoors and move laterally through networks.

5

Covering Tracks

Click to expand

Understand anti-forensics techniques that attackers use to hide their presence. From a defensive perspective, learn what evidence to look for and how to detect evasion attempts.

6

Reporting

Click to expand

Document findings, risk ratings, and remediation recommendations in a professional penetration test report. Clear reporting is what separates a pentest from an attack.