Starting with Kali Linux
Identifying the Target – Passive Reconnaissance
Active Reconnaissance and Vulnerability Scanning
Exploit
Post Exploit – Action on the Objective
Post Exploit – Persistence