Depending on the scope of the test, ensure that com promised systems may be accessed throughout the test.
Build and configuration review testing uses an authenticated -- credential base access and scanning --
Exploitation
Wireless network pentesting provides an ordered list of issues, their associated qualitative risks, and remediation