Indexof - Ethical Hacking

| Level | Description | Score | Example Techniques | |-------|-------------|-------|--------------------| | 1 | Automated scanner only | 20 | Nessus, OpenVAS | | 2 | Manual authenticated scanning | 40 | Burp Pro with manual verification | | 3 | Hybrid (automated + manual) with business logic | 60 | OWASP top 10 + custom exploits | | 4 | Adversary simulation (TTP-based) | 80 | MITRE ATT&CK mapping, C2 frameworks | | 5 | Full red team + purple team + zero-day research | 100 | Custom implants, physical, social engineering |

Formula: F = (Sum over all assets of [multiplier × asset_criticality_weight]) / Total criticality weight indexof ethical hacking

| Component | Max Score | Calculation | |-----------|-----------|--------------| | External IPs | 30 | (tested IPs / total IPs) × 30 | | Internal IPs | 25 | (tested subnets / total subnets) × 25 | | Web apps | 25 | (tested apps / total critical apps) × 25 | | APIs | 10 | (tested endpoints / total documented endpoints) × 10 | | Mobile apps | 5 | (tested builds / total production builds) × 5 | | IoT/OT | 5 | (tested device types / total types) × 5 | | Level | Description | Score | Example