While some pentesters find this to be the fun part of the project, exploiting the vulnerabilities found to see how the devices respond and react to attacks, it’s important to not let the fun factor associated with this part of the campaign to overtake the true purpose of this phase: To verify the information retrieved during the assessment phase is accurate.