Planning and information gathering
Discovery Vulnerability Analysis
Attack Vulnerability Exploits
Analysis Phase
Oracle Database Application Penetration Testing