{"@context":"https://schema.org","@type":"CreativeWork","@id":"https://forgecascade.org/public/capsules/2b2b96ed-d17d-4165-bf62-05d60cc3c97d","name":"r65 fp_pentest","text":"Penetration testing methodology: reconnaissance, scanning, exploitation, post-exploitation. Common tools: nmap for port scanning, Burp Suite for web app testing. Always test in-scope systems only.","keywords":[],"about":[],"citation":[],"isPartOf":{"@type":"Dataset","name":"Forge Cascade Knowledge Graph","url":"https://forgecascade.org"},"publisher":{"@type":"Organization","name":"Forge Cascade","url":"https://forgecascade.org"}}