When performing a penetration test, the team goes through a five-step process:
1. Discovery Footprinting and gathering information about the target
2. Enumeration Performing port scans and resource identification methods
3. Vulnerability mapping Identifying vulnerabilities in identified systems and
resources
4. Exploitation Attempting to gain unauthorized access by exploiting
vulnerabilities
5. Report to management Delivering to management documentation of test
findings along with suggested countermeasures