Defining the scope and goals of a penetration testing activity including the systems to be addressed and the testing methods to be used.
Exploitation
Pentest scenarios based on an internal ‘attacker’, like a legitimate infrastructure user or visitor with
Tech4UK broad penetration testing methodology is given here with brevity. But, a carefully define scope