- Prioritization of possible attacks (create scoring matrix) - probability of success - leverage NVD calculator and CVSS scoring - complexity - probability of damage - Preparation for attack - Reconstruct exploit locally on a VM representing the target host - Check with client if in doubt