Target Discovery,2
Vulnerability Detection,3
Vulnerability Exploitation,5
Success,6