OSINT
Recon
Internal Enumeration
Exploitation
Privilege Escalation
Lateral Movement
Persistence
Data Exfiltration
Useful notes and links
OT Security
C2 - Command&Control