1. Reconnaissance

2. Scanning & Enumeration

3. Gaining Access (Exploitation)

4. Maintaining Access (Post-Exploitation)

5. Covering Tracks

All Phases