# Attacking Enterprise Networks

Stages

* Pre-Engagement
* Information Gathering
* Vulnerability Assessment
* Exploitation
* Post-Exploitation
* Lateral Movement
* Proof of Concept
* Post-Engagement
