Phase 2
·Phase 2: Enumaration: Find out how and where to use the information found in previous step to discover attack vectors
During the enumeration phase, a lot of information about specific systems is collected to find vulnerable and exploitable systems and define alternate attack vectors (i.e. spear phishing, etc.)
Find and scan live hosts and access point
Find accounts and policies
Vulnerability assessment