- Prioritization of possible attacks (create scoring matrix)
- probability of success
- leverage NVD calculator and CVSS scoring
- complexity
- probability of damage
- Preparation for attack
- Reconstruct exploit locally on a VM representing the target host
- Check with client if in doubt