You’re wrapping up a sprint-bound web security test. Which combined plan best reflects a structured methodology → attack surface → tooling flow?
Run Nikto; if clean, skip WSTG
Follow PTES phases; map tests to WSTG categories; focus on high-risk areas (auth/session, inputs, APIs, uploads); use Burp, ZAP, SQLmap, Dirb/Gobuster, Hydra as needed; report with exploit evidence and fixes
Start with OSSTMM wireless, then only do client-side checks
Run Wappalyzer; if WordPress, always exploit with Metasploit first
This question is part of this quiz :
Cyber Quiz Day 29