This document provides an overview of ethical hacking methodologies. It describes the cyber kill chain model which outlines the stages of an attack as reconnaissance, weaponization, delivery, exploitation, installation, command and control, actions on objectives. It also describes the attack lifecycle model and its stages of initial recon, initial compromise, establishing footholds, escalating privileges, internal recon, lateral movement, maintaining presence, and completing the mission. Finally, it outlines the methodology of ethical hacking and its stages of reconnaissance and footprinting, scanning and enumeration, gaining access, maintaining access, and covering tracks.