There are many Pentest Methodologies that all share the same basic approach but their phases are named differently:
- Pre-engagement steps / Preparation / Scoping
- Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting
- Threat Modeling
- Scanning / Mapping / Enumeration / Vulnerability Analysis / Discovery
- Exploitation
- Post-Exploitation / Maintaining Access / Covering Tracks
- Reporting