Port Scan, Server Identification / Profile (IIS/Apache/Tomcat/.. ), Gather Information, Vulnerability Scan Reports (Information left by auditors / hackers for us), Find other points of entry (Login Portals / Terminal Servers), Database Injection, Devices (Firewalls/Routers/Virus/Phone/Webex/Print).