The planning phase of the PenTest involves gathering information from all available resources, as well as scanning and fingerprinting network systems. Based on the findings, vulnerabilities are then identified, prioritized, and verified. The methodology is concise and repeatable to ensure the success of confidentiality, integrity, and availability of the information.