# Metodología \[HTB]

{% embed url="<https://academy.hackthebox.com/module/90/section/936>" %}

<figure><img src="https://2973713173-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCXRmc6muOIfxr0XFGIw0%2Fuploads%2FjJZges9mOmre1QTgMzGu%2F0-PT-Process.webp?alt=media&#x26;token=b44a84d8-b1d2-4456-bc42-fb703945cfcd" alt=""><figcaption></figcaption></figure>

Pre-Engagement&#x20;

Information Gathering&#x20;

Vulnerability Assessment&#x20;

Exploitation&#x20;

Post-Exploitation&#x20;

Lateral Movement&#x20;

Proof-of-Concept&#x20;

Post-Engagement&#x20;

Practice
