This document outlines the methodology for performing a penetration test in three phases: planning and preparation, assessment, and reporting. The planning phase involves setting scope and contacts. The assessment phase consists of information gathering, network mapping, vulnerability identification, penetration testing, privilege escalation, and maintaining access. The final phase covers reporting findings, cleanup, and destroying artifacts. The goal is to find security vulnerabilities before attackers do.