In this phase, we gather complete information to understand the target in-hand. Our methodology is to know what services running in detailed.
This involves the categorizing and analysis of vulnerabilities discovered as a result of the previous steps.
Simulating a real-world attack to document any vulnerability.
Findings from the above steps are documented so as to provide a high-level understanding of the vulnerabilities of the target in-hand and outlining the findings with relevant mitigations for prioritizing fixes.