Do you follow any methodology during a pentest?

Question for the pentesters out there.
When you are doing a test, do you follow any methodology (OSSTMM, OWASP, CHECK...) or do you follow your own process?
When you are doing a test, do you follow any methodology (OSSTMM, OWASP, CHECK...) or do you follow your own process?
Comments
-
philz1982 Member Posts: 978
I follow the web application hacker hand book chapter 21Read my blog @ www.buildingautomationmonthly.com
Connect with me on LinkedIn @ https://www.linkedin.com/in/phillipzito -
dave0212 Member Posts: 287
I have used OSSTMM previously and based on ongoing evolutions at work will probably start to use CHECK in the futureThis week I have achieved unprecedented levels of unverifiable productivity
Working on
Learning Python and OSCP