Penetration Testing

1. Pre-Engagement Activities

2. Information Gathering

3. Threat Modeling

4. Vulnerability Assessment

5. Exploitation

6. Post-Exploitation

7. Reporting

8. Remediation and Retesting

9. Lessons Learned