Penetration Testing

Penetration testing, or pen testing, is a simulated security testing process conducted by an enterprise or third party “ethical hacking” service to test the company s network and IT systems for vulnerabilities and potential for cybersecurity exploits.

Penetration testing examines corporate security from a hacker s point of view, analyzing and testing the company s existing security systems and processes to identify exploitable vulnerabilities as well as areas that could be improved from a data protection and security standpoint.

The idea behind penetration testing is to find exploitable weaknesses in the corporate network and patch or fortify them before cyber attackers have a chance to discover and take advantage of them.

Some of the more popularly used tools deployed for penetration testing include Metasploit, Portswigger Web Security s Burp, Kali Linux, Fiddler, Nessus, Nmap, sqlmap, Wireshark, John the Ripper, Hyrda, Aircrack-ng, and Zed Attack Proxy.

Penetration Testing Tools

Image source: Imperva

How Security Penetration Tools Work

Penetration testing can be conducted manually as needed or can be set up with software tools to run automatically, either continuously or periodically. Systems involved in pen testing can include network access points, front-facing web sites, application protocol interfaces (APIs), backend databases and servers, in-house and third-party applications that connect to the corporate network, and more.

Penetration tools typically operate using lists of known security vulnerabilities and issues and then attempt to exploit and penetrate corporate security defenses based on these vulnerabilities.

In this sense, penetration tools differ from security vulnerability scanning tools, which focus solely on discovering new or existing vulnerabilities and not on attempting to exploit them. That said, many security tools on the market today combine both vulnerability scanning and penetration testing capabilities.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Related Articles

10 Quick Tips For Social Media Marketing

10 Quick Tips for Social Media Marketing Social Media Defined: Social media is a phrase used to describe a variety of Web-based platforms, applications and...

Digital Advertising

What is Digital Advertising? Digital advertising is marketing to a target audience through digital platforms, including social media, email, search engines, mobile apps, affiliate programs,...

E-Commerce

E-commerce, or electronic commerce, is online-conducted business, including marketing, sales, and fulfillment. Consumers and businesses place and track orders at least partially through the...

Virtualization Software

Virtualization software is a digital solution used to create an abstraction layer for hardware. The software creates multiple instances, or virtual machines (VMs), that...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...