Simply put, it is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. It is performed by an ethical hacker in a controlled environment.
What Questions Does a Penetration Test Answer?
What are Some Common Objectives of a Penetration Test?
What is the Penetration Testing Process of Caesium55?