Methodology

  1. Planning and Reconnaissance
  2. Scanning and Vulnerability Assessment
  3. Exploitation
  4. Detailed analysis Report
  5. Refactoring and ReScanning