Common Phases of an Attack
¨Phase 1: Reconnaissance
¨Phase 2: Scanning
¨Phase 3: Gaining Access
¨Phase 4: Maintaining Access
¨Phase 5: Covering Tracks