Initial Penetration - Finding the first point of access which may be an external facing server
Establishing control - Usually involves elevation of privileges and establishing some method of remote control (reverse shell, web shell, RDP access and etc