1. Reconnaissance
2. Scanning & Enumeration
3. Gaining Access (Exploitation)
4. Maintaining Access (Post-Exploitation)
5. Covering Tracks
All Phases