Penetration Test Stages Activity

🔄 Match the Stage

Reconnaissance
Scanning & Enumeration
Exploitation
Post-Exploitation
Covering Tracks & Documentation
🔍 Identifying vulnerabilities in a system.
📜 Removing traces and documenting findings.
🛠 Maintaining access and escalating privileges.
💥 Gaining unauthorized access.
🕵️ Gathering information about a target.