Scan for live devices on a network. Gather information about open ports, OS’s, Services, etc.
— Check for live systems (Ping or other way to determine live hosts)
— Check for open ports (Scan the live hosts for listening ports)
— Scan beyond IDS (If needed, scan with IDS evasion)
— Perform banner grabbing (Grab data from servers, OS fingerprinting)
— Scan for vulnerabilities (Look at vulnerabilities of open systems)
— Draw network diagram (Shows pathways into networks)
— Use proxies (Obscures efforts to keep you hidden)
— Pentest report (Document everything that you find)