Methodology Information Gathering Process Exploit Repeat - (extensive trial and error is often required)