Cyber Threat Hunting

Welcome to CyberHunting.com web page, a community of security researchers. Providing information related to cyber threat hunting, penetration testing, bug bounty, security awareness and best practices information security.

Start learning the Penetration Testing Execution Standard (PTEST) and Cyber Kill Chain.

Penetration Testing Execution Standard (PTEST)

  1. Pre-interaction
  2. Intelligence Gathering
  3. Threat Modelling
  4. Vulnerability Assessment
  5. Exploit
  6. Post-exploit
  7. Reporting

Cyber Kill Chain

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Actions on objectives.

Featured Image by Cristiana Gilardi.

Pardon our dust we are updating our Service page for Cyber Threat Hunting.

Thank you.

Twitter: @KINGnet Web: https://KING.net

Support @QUE.COM

Founder, QUE.COM Internet Media. | Founder, Yehey.com a Shout for Joy! | MAJ.COM Management of Assets and Joint Venture.. More at KING.NET Ideas to Life.

Leave a Reply