Step 1-Gather Information.
Step 2-Planning of Testing Tools.
Step 3-Deep Analysis
Step 4-Intrusion attacks are planned to targeted sites.
Step 5-Testing for web attacks such as Cross Site Scripting(XSS), Backdoors, SQL Injection.
Step 6- Tests are consolidated and compiled into a detailed report.