https://s3-us-west-2.amazonaws.com/secure.notion-static.com/9866c0d3-9563-4462-98c3-3533ff307009/Untitled.png

Step 1 : Foot Printing

Step 2 : Scanning

Step 3 : Enumeration

Step 4 : Gaining Access

Step 5 : Escalating Privilege

Step 6 : Pilfering

Step 7 : Covering Track

Step 8 : Creating Backdoor

각 계층에서의 취약점