Planning for an Engagement
Scoping an Engagement
Information Gathering
Vulnerability Identification
Social Engineering and Specialised System Attacks
Network-Based Exploits
Application-Based Vulnerabilities
Local Host Vulnerabilities
Post-Exploitation and Facilities Attacks
Penetration Testing Tools
Reporting and Communication
Analyzing Tool and Script Output