Now that we have a good understanding of vulnerability causes from the earlier section, let's look at the five stages of pen tests in this section:
The preceding diagram depicts the life cycle of pen tests, involving five phases of activities such as Preparation, Scanning, Gaining Access and Maintaining Access, and reporting.
Let's look at each phase in more detail in the following sections.