{"id":27058,"date":"2022-04-21T15:28:43","date_gmt":"2022-04-21T15:28:43","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=27058"},"modified":"2026-03-18T06:21:28","modified_gmt":"2026-03-18T06:21:28","slug":"what-are-the-5-stages-of-penetration-testing","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/","title":{"rendered":"What are the 5 Stages of Penetration Testing?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As per Cyberwarfare in the C-suite Report, global cybercrimes are anticipated to grow by 15% year-over-year until 2025. This expands to\u00a0 $10.5 trillion annually, up from $3 million in 2015.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, people working in small businesses are targeted by <\/span><a href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2022\/03\/30\/cyber-criminals\/?sh=46c73d3e52ae\"><span style=\"font-weight: 400;\">350% more social engineering<\/span><\/a><span style=\"font-weight: 400;\">\u00a0attacks than large firms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sounds scary, right? So, what&#8217;s the solution to this global issue? The answer is penetration testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s a technique to attack your own system and check vulnerable points. The insights gained from pen testing help businesses deploy the right cybersecurity protocols to bar entry of real threat actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typically, there are five <\/span><b>stages of penetration testing<\/b><span style=\"font-weight: 400;\">. Continue reading to learn about them.\u00a0<\/span><\/p>\n<h2><b>Planning and Scoping<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This is the first among the <\/span><b>five <\/b><b>stages of penetration<\/b> <b>testing<\/b><b>. <\/b><span style=\"font-weight: 400;\">It involves planning to imitate a cyberattack. This helps gain information about entry points and loopholes in the security system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s undoubtedly one of the most time-consuming <\/span><b>stages of penetration testing<\/b><span style=\"font-weight: 400;\">.\u00a0 Experts must explore the elements of the IT structure, locate vulnerabilities, and see how the system responds to such <\/span><a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\"><span style=\"font-weight: 400;\">attacks<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They search for information related to clients, employees, finances, strategies, source coding, network topology, IP addresses, and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This <\/span><b>phase of penetration testing<\/b><span style=\"font-weight: 400;\"> also includes researching open ports and apps that are prone to attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Testers use <\/span><span style=\"font-weight: 400;\">penetration testing tools <\/span><span style=\"font-weight: 400;\">depending on the depth and aim of the analysis. The type of elements targeted in the IT environment are also contributing factors. Common gathering approaches include <\/span><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\"><span style=\"font-weight: 400;\">social engineering<\/span><\/a><span style=\"font-weight: 400;\">, dumpster diving, and network scanning.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dumpster diving is a way of attackers to obtain information which can be used for maintaining or establishing trust. This can even be a harmless document. On the other hand network scanning is used for finding all the active devices on a network. These are then mapped to their respective IP addresses to patch the exploiter.<\/span><\/p>\n<h2><b>Asset Discovery<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Based on their findings in the primary stage, white-hat hackers scan the tools and plan on <\/span><span style=\"font-weight: 400;\">how to do penetration testing step by step<\/span><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The goal of this second <\/span><b>stage of penetration testing<\/b><span style=\"font-weight: 400;\"> is to locate any weak points. They\u2019re potential access points for attackers. As such, all details must be noted properly as they\u2019ll support the next <\/span><b>penetration test stages<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Attack Simulation and Exploitation<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Followed by the first two <\/span><b>stages of a management penetration testing project<\/b><span style=\"font-weight: 400;\">, this <\/span><b>stage of web penetration testing <\/b><span style=\"font-weight: 400;\">aims to evaluate the effectiveness of the operational security controls by performing an actual attack on the structure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While exploiting the system, white-hat hackers try to go as deep into the system as possible to identify the intensity of vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is done in two ways:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Static Analysis<\/b><span style=\"font-weight: 400;\">: This examines the applications&#8217; codes to check how they behave while running. There are several tools to evaluate the entirety of the code in one go.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dynamic Analysis<\/b><span style=\"font-weight: 400;\">: This is a practical way of finding out exactly how the applications respond while running. This approach offers a real-time overview of the coding.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">After gaining a foothold in the network, the penetration tester holds the simulated attack for an extended period. This is done to mimic the goals of a threat actor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\">goals of penetration testing <\/span><span style=\"font-weight: 400;\">are to obtain maximum network data and access to the system. This ensures all the efforts are leaping in the right direction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The different <\/span><b>phases of penetration testing stages<\/b><span style=\"font-weight: 400;\"> let a business know how badly they could be affected in case of an actual cyberattack. The malicious actors can steal important information and passwords, causing detrimental effects to a brand\u2019s reputation.\u00a0<\/span><\/p>\n<h2><b>Analysis and Reporting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The fourth <\/span><b>stage of penetration testing<\/b><span style=\"font-weight: 400;\"> is all about creating and submitting a report and sharing the entire penetration testing process. Irrespective of the <\/span><span style=\"font-weight: 400;\">type of penetration testing<\/span><span style=\"font-weight: 400;\">, some common information in the report includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Intensity of the risks emerging from identified susceptibilities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tools that may allow\u00a0 hackers to bypass the system<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Description of all gathered data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Elements where security protocols have been implemented or changed<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remediation recommendations against future attacks<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It&#8217;s one of the most important <\/span><b>stages of penetration testing<\/b><span style=\"font-weight: 400;\">. The report helps technical and managerial personnel understand what necessary preventative measures to implement. Therefore, it\u2019s best to create separate reports; one for the technical team and the other one for non-technical team members.\u00a0<\/span><\/p>\n<h2><b>Retesting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The last <\/span><b>stage of a penetration test<\/b><span style=\"font-weight: 400;\"> is retesting. It&#8217;s an evaluation done after a specific time period (typically 2-3 months after submitting the report) to check if the vulnerabilities are remediated.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most businesses only get critical elements retested. It\u2019s much less costly than re-running an entire penetration test. Business owners can also evaluate the effectiveness and improvement of a pen testing drill.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Essentially, retesting ensures that everything has been implemented correctly, and the system is now well-protected against future attacks.\u00a0<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Irrespective of size and industry, businesses are becoming more vulnerable to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/\"><span style=\"font-weight: 400;\">cyberattacks<\/span><\/a><span style=\"font-weight: 400;\"> as the number of spoofers increase, especially post-Covid. The FBI&#8217;s Internet Crime Report 2020 states a\u00a0<\/span><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2020_IC3Report.pdf\"><span style=\"font-weight: 400;\">69% increase<\/span><\/a><span style=\"font-weight: 400;\"> in the number of cybercrimes reported from 2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are even\u00a0<\/span><span style=\"font-weight: 400;\">targeting schools and health care centres<\/span><span style=\"font-weight: 400;\"> by stealing information and demanding ransoms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This makes it even more crucial to know the <\/span><span style=\"font-weight: 400;\">benefits and risks of penetration testing <\/span><span style=\"font-weight: 400;\">and its five stages.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As per Cyberwarfare in the C-suite Report, global &#8230;<\/p>\n","protected":false},"author":1,"featured_media":27838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,199],"tags":[],"class_list":["post-27058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What are the 5 Stages of Penetration Testing? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the 5 Stages of Penetration Testing?\" \/>\n<meta property=\"og:description\" content=\"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-21T15:28:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T06:21:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What are the 5 Stages of Penetration Testing?\",\"datePublished\":\"2022-04-21T15:28:43+00:00\",\"dateModified\":\"2026-03-18T06:21:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-are-the-X-Stages-of-Penetration-Testing_.jpg\",\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/\",\"name\":\"What are the 5 Stages of Penetration Testing? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-are-the-X-Stages-of-Penetration-Testing_.jpg\",\"datePublished\":\"2022-04-21T15:28:43+00:00\",\"dateModified\":\"2026-03-18T06:21:28+00:00\",\"description\":\"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-are-the-X-Stages-of-Penetration-Testing_.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-are-the-X-Stages-of-Penetration-Testing_.jpg\",\"width\":1440,\"height\":910,\"caption\":\"What are the X Stages of Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-the-5-stages-of-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What are the 5 Stages of Penetration Testing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are the 5 Stages of Penetration Testing? | EasyDMARC","description":"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"What are the 5 Stages of Penetration Testing?","og_description":"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.","og_url":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-04-21T15:28:43+00:00","article_modified_time":"2026-03-18T06:21:28+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What are the 5 Stages of Penetration Testing?","datePublished":"2022-04-21T15:28:43+00:00","dateModified":"2026-03-18T06:21:28+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/"},"wordCount":866,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/","url":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/","name":"What are the 5 Stages of Penetration Testing? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","datePublished":"2022-04-21T15:28:43+00:00","dateModified":"2026-03-18T06:21:28+00:00","description":"Penetration testing checks system loopholes through a mimicked cyberattack. Learn about stages of penetration testing from our article.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","width":1440,"height":910,"caption":"What are the X Stages of Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-are-the-5-stages-of-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"What are the 5 Stages of Penetration Testing?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/04\/What-are-the-X-Stages-of-Penetration-Testing_.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=27058"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27058\/revisions"}],"predecessor-version":[{"id":59913,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27058\/revisions\/59913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/27838"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=27058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=27058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=27058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}