Target Discovery,2
Reconnaissance,3
Vulnerability Discovery,4
Exploitation,7
Flag Capturing,8
Success,9