From 7bd0e0b0c6a1e517c7e821349cbd00b4a37c32ed Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Sun, 27 Apr 2025 23:40:09 +0200 Subject: [PATCH] a --- src/README.md | 1 - .../pentesting-methodology.md | 2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/src/README.md b/src/README.md index d5158a754..9fe687d13 100644 --- a/src/README.md +++ b/src/README.md @@ -189,4 +189,3 @@ welcome/hacktricks-values-and-faq.md ![HackTricks Github Stats](https://repobeats.axiom.co/api/embed/68f8746802bcf1c8462e889e6e9302d4384f164b.svg) {{#include ./banners/hacktricks-training.md}} - diff --git a/src/generic-methodologies-and-resources/pentesting-methodology.md b/src/generic-methodologies-and-resources/pentesting-methodology.md index 97ef23fa4..7cece6743 100644 --- a/src/generic-methodologies-and-resources/pentesting-methodology.md +++ b/src/generic-methodologies-and-resources/pentesting-methodology.md @@ -13,7 +13,7 @@ _Hacktricks logos designed by_ [_@ppiernacho_](https://www.instagram.com/ppieran Do you have **physical access** to the machine that you want to attack? You should read some [**tricks about physical attacks**](../hardware-physical-access/physical-attacks.md) and others about [**escaping from GUI applications**](../hardware-physical-access/escaping-from-gui-applications.md). -### **1-** [**Discovering hosts inside the network**](pentesting-network/index.html#discovering-hosts)/ [Discovering Assets of the company](external-recon-methodology/index.html) +### 1- [Discovering hosts inside the network](pentesting-network/index.html#discovering-hosts)/ [Discovering Assets of the company](external-recon-methodology/index.html) **Depending** if the **test** you are perform is an **internal or external test** you may be interested on finding **hosts inside the company network** (internal test) or **finding assets of the company on the internet** (external test).