- Reconnaissance: look for vulnerabilities
- Gain access to the system through vulnerability
- Escalate access to gain more advanced privileges
- With advanced privileges, tunnel through network looking for additional systems to access
- Install tools on compromised systems to gain deeper network access
- Install a backdoor to allow long-term access even if the initial vulnerability is corrected
- Continue to probe until find ultimate target