Penetration Testing Activities Table of Contents 1 – Open-Source Intelligence / Static Code Analysis 2 – Active Information Gathering 3 – Post Exploitation 4 – Client-Side Exploitation 5 – Web Application Exploitation 6 – Cloud Security 7 – Network Binary Exploitation Not yet complete