Goal: Build as robust a profile on the target (Artemis) as possible. The profile should include the target’s technology stack, email addresses, phone numbers, resumes, and so on.
Phase 3 - Identify Vulnerabilities
Goal: Identify the tools and techniques to be used to scan for vulnerabilities.
Phase 5.1 - Executive Summary
Goal: Create two mock reports for the client: An Executive Summary for the client’s senior management
Phase 2 - Identify Targets and Run Scans
Goal: Identify the tools and techniques to be used to perform host discovery and enumeration.
Phase 4 - Threat Assessment
Goal: Create a hypothetical threat assessment based on vulnerabilities you expect to find when you perform your actual scans against the client’s network.rt.
Phase 5.2 - Detailed Technical Report
Detailed Technical Report for the client’s IT staff and submit them to your boss (in this case, your mentor).