CompTIA Methodology
Ethical Hacker Methodology
1. Permission 2 Performing Recon 3. Scanning and Enumeration 4. Gaining Access 5. Escalation of Privilege 6. Maintaining Access 7. Covering Tracks and Placing Backdoors 8. Reporting
NIST SP 800-115 Methology