The Five Stages of Penetration Testing

Stage

Description

Example

1. Reconnaissance

Gather information about the target.

Searching the company’s website or IP address.

2. Scanning

Check open ports, services, and vulnerabilities.

Using tools like Nmap.

3. Gaining Access

Try exploiting a weakness.

Using a known password leak.

4. Maintaining Access

Test if access can remain unnoticed.

Setting a backdoor temporarily.

5. Reporting

Document findings and suggest fixes.

Writing a security improvement report.