Identification,1
Exploit Development,2
Exploit Execution,3
Success,4