Stages of pentesting Pre-Engagement Information Gathering Vulnerability Assessment Exploitation/Post-Exploitation Lateral Movement Proof-of-Concept