Penetration test

Preparation

Reconnaissance

Vulnerability Analysis

Exploitation

Post-Exploitation

Reporting

Review and Retest

Post-Testing Actions

Related Checklists