Penetration testing or pen testing is designed to test a system, network, or web
application to find gaps or vulnerabilities that have the potential to be exploited by an
attacker or hacker.
1. Uncover vulnerabilities, security flaws and potential threats
2. Analyze and determine attack surfaces and scenarios
3. Prioritized recommendations and corrective actions
1
Define scope, documentation, and rules.
2
Evaluate application and/or network layers along with segmentation.
3
Findings and insights which are applicable and useful.
1
2
3
4
5