# Penetration testing ## Phases recon, scanning, exploitation, post-exploitation, reporting ## Difference vs vuln scanning ## Legal and ethical considerations