Based on knowledge about environment/infrastructure

The following are the types of vulnerability assessments that simulate exposure from an attacker's point of view, based on the attacker's knowledge of the environment/infrastructure.