Coming ...
Find
->
target information
Analyze
->
target
Exploit
->
target vulnerabilities
Realize
->
on assets