Once the PenTest-er has gathered information about the target and identified potential vulnerabilities, the next step is to decide which ones to focus on first. This prioritization is based on the goals of the PenTest and the network devices that have been discovered.

After deciding which network resources to target, the PenTest-er will use the information collected earlier to carry out exploits against the target machines.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Prepare and Prioritize Attacks

Randomly launching exploits is the mark of an amateur. A professional tester prioritizes attacks based on the objective and the Rules of Engagement.

2. Scripting Automation

Manual testing doesn't scale. Scripting allows a tester to perform tasks across hundreds of machines simultaneously or modify tools to fit a specific environment.