上QQ阅读APP看书,第一时间看更新
Methodology
This metric is based on the methodology itself, and the tools are used in every step when conducting the penetration testing. Answer the following questions in terms of yes or no:
- Does the used methodology already exist or is it customized?
- Are all the steps done in a connected way?
- Did you use both manual and automated tools?
- Did you actually exploit the target?
- Is pivoting allowed?