Pentest conducted through the Internet by an ‘attacker’ with no preliminary knowledge of your system
In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence
Exploitation
Depending on the scope of the test, ensure that all traces and footprints of the