Methodology Planning and Reconnaissance Scanning and Vulnerability Assessment Exploitation Detailed analysis Report Refactoring and ReScanning