Scoping, Methodology & Reporting
15%
Rules of engagement, risk framing, evidence quality, and professional reporting.
External/Internal Reconnaissance
20%
Host discovery, service enumeration, attack-surface prioritization.
Exploitation & Initial Access
25%
Service/web exploitation, credential attacks, and foothold validation.
Privilege Escalation & Lateral Movement
25%
Local escalation, AD abuse paths, pivoting and credential reuse control checks.
Post-Exploitation & Hardening Guidance
15%
Proof of impact, cleanup, remediation mapping, and retest recommendations.