During the attacks and exploits phase, the penetration tester attempts to exploitvulnerabilities discovered during information gathering. This may involvetechniques such as social engineering attacks, system-level exploitation, or webapplication attacks. The objective here is to achieve initial access in a controlledand documented manner
Needs a lot of attention