Defining the scope and goals of a penetration testing activity including the systems to be addressed and the testing methods to be used.
Exploitation
Depending on the scope of the test, ensure that all traces and footprints of the
Build and configuration review testing uses an authenticated -- credential base access and scanning --