Reconnaissance
Gather information about the target’s infrastructure, assets, and potential entry points.
Mapping
Identify live systems, open ports, services, vulnerabilities, and misconfigurations.
Exploitation
Attempt to exploit discovered weaknesses to gain access or escalate privileges.