Penetration Testing

Penetration testing, or pen testing, is a simulated security testing process conducted by an enterprise or third party “ethical hacking” service to test the company s network and IT systems for vulnerabilities and potential for cybersecurity exploits.

Penetration testing examines corporate security from a hacker s point of view, analyzing and testing the company s existing security systems and processes to identify exploitable vulnerabilities as well as areas that could be improved from a data protection and security standpoint.

The idea behind penetration testing is to find exploitable weaknesses in the corporate network and patch or fortify them before cyber attackers have a chance to discover and take advantage of them.

Some of the more popularly used tools deployed for penetration testing include Metasploit, Portswigger Web Security s Burp, Kali Linux, Fiddler, Nessus, Nmap, sqlmap, Wireshark, John the Ripper, Hyrda, Aircrack-ng, and Zed Attack Proxy.

Penetration Testing Tools

Image source: Imperva

How Security Penetration Tools Work

Penetration testing can be conducted manually as needed or can be set up with software tools to run automatically, either continuously or periodically. Systems involved in pen testing can include network access points, front-facing web sites, application protocol interfaces (APIs), backend databases and servers, in-house and third-party applications that connect to the corporate network, and more.

Penetration tools typically operate using lists of known security vulnerabilities and issues and then attempt to exploit and penetrate corporate security defenses based on these vulnerabilities.

In this sense, penetration tools differ from security vulnerability scanning tools, which focus solely on discovering new or existing vulnerabilities and not on attempting to exploit them. That said, many security tools on the market today combine both vulnerability scanning and penetration testing capabilities.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

AutoLocky Ransomware

AutoLocky is ransomware written in the popular AutoIt scripting language. It uses strong...

Data Governance

Data governance is a term used to refer to the management of processes,...

Capacity Planning

Capacity planning is a process that helps organizations determine the resources needed to...