Recon
Passive and active reconnaissance techniques to map the target surface.
Enumeration
Deep-dive enumeration to identify entry points and misconfigurations.
Exploitation
Gaining initial access by exploiting discovered vulnerabilities.
Post-Exploitation
Actions on objectives - persistence, pivoting, and exfiltration.