Step 1 : Foot Printing

Step 2 : Scanning

Step 3 : Enumeration

Step 4 : Gaining Access

Step 5 : Escalating Privilege

Step 6 : Pilfering

Step 7 : Covering Track

Step 8 : Creating Backdoor

각 계층에서의 취약점