Reconnaissance (attacker gets to know you), Weaponization (attacker chooses or develops the exploit in order to get ready to attack), Delivery (delivery's the weaponized bundle via email web, USB, etc), Exploitation (Attacker exploits a vulnerability to execute code on victims system, may be remotely activated or automatically TO GAIN ACCESS), Installation (Install malware on the asset such as creating new user, new firewall rules to allow attacker access, attacker feels as home), C2 (Command and Control phase, Command channel for remote manipulation of victims), Actions on Objective ( Attacker can complete orginal goal or goals