The phases cut across footprinting, Network scanning, Enumeration, Vulnerability analysis, steganography among others.