The most important part for a professional. A good report includes:
Example: nmap -sV -O [target_ip] (Identifies service versions and the operating system). 3. Vulnerability Analysis Once you know what’s running, find the "holes." Penetration Testing with Kali Linux
Example: searchsploit apache 2.4.49 will list available exploits for that specific version. 4. Exploitation (Gaining Access) The most important part for a professional