Everyone has its own, but it usually consists of:

  • Footprinting (passive)
  • Scanning (active)
  • Enumeration – is there a value behind the door?
  • Hacking – attack execution
  • Covering – hiding the activity from previous steps
  • Backdoors – wanna come back?