Configure and launch an autonomous security assessment
Collect open-source intelligence about the target
Test for weak passwords and credentials