# Methodology

- [To Scan a Network](/methodology/to-scan-a-network.md): Methodology To Scan a Network on a Penetration testing assessment, understand what to do without triggering IDS alarms.
- [To Attack a Linux Machine](/methodology/to-attack-a-linux-machine.md): Methodology To Attack a Linux Machine
- [To Attack a Windows Machine](/methodology/to-attack-a-windows-machine.md): Methodology To Attack a Windows Machine
- [Linux Privilege Escalation](/methodology/linux-privilege-escalation.md): Methodology to Privilege Escalation on Linux
- [Windows Privilege Escalation](/methodology/windows-privilege-escalation.md): Methodology to Privilege Escalation on Windows
- [Linux Post Exploitation](/methodology/linux-post-exploitation.md): Linux Post Exploitation Methodology
- [Windows Post Exploitation](/methodology/windows-post-exploitation.md): Windows Post Exploitation Methodology
- [Pivoting Methodology](/methodology/pivoting-methodology.md): Methodology to Pivoting Inside Networks
