Penetration Testing 101
Ethical hackers use penetration testing, or pentesting, to test the security measures of computer systems. Pentesters will use all the tricks of the hacking trade to try and breach the networks of their clients. They then advise on how to make them safer.
Why is it useful?
Organizations often have very complicated computer networks. And their in-house IT experts may not have experience with actual hacking. Hackers are at an advantage because they only need to win one attack while the target has to win every defense. Because pentesters know how hackers think and operate, they have a better chance of detecting vulnerabilities.
How does it work?
Pentests can be from mild to extreme. An organization may just want its web apps or a specific portion of its software to be tested, and would consider everything else out of scope (forbidden from hacking attempts by the pentesters). Another organization may want a more thorough investigation, which might involve malicious targeted surveillance, long-term keylogging, the planting of bugs, or in-person surveillance of a client’s office.
Some of the more novel pentester ploys include dressing up as a janitor and requesting access to a computer room, following employees of a company to the local bar to extract information from them, and shutting down an office’s WiFi so employees are forced to use an insecure connection in a neighboring café.
When techniques like these are combined it’s known as 'red teaming', highly intrusive operations in which pentesters act like the enemy in every possible way. According to RedTeam Security, based in Saint Paul, Minnesota:
The objective of a red team test is to obtain a realistic level of risk and vulnerabilities against your technology, people and physical/facilities.
- Technology: networks, applications, routers, switches, appliances, etc.
- People: staff, independent contractors, departments, business partners, etc.
- Physical: offices, warehouses, substations, data centers, buildings, etc.
During the pentest, logs of every action are carefully kept so a final report can be delivered. The report contains an assessment of the risk threats. Clients may learn that they’ve been hacked in the past, or that a hacker is sitting in their network at present. Sensitive/personal data may also be uncovered. That’s why it’s crucial to establish trust between the client and the tester.
Who else does it help?
A pentest increases security for everyone. Pentesters may discover new attack methods and every pentest makes the testers themselves smarter. The more systems they investigate, the more viruses they can patch.
"The social experience where you activate your gaming skills as you train like a spy."
- TimeOut
Pulse-racing challenges - crafted with experts from CIA and Special Ops to test your teamwork, agility, collaboration and communication.

SPYSCAPE+
Join now to get True Spies episodes early and ad-free every week, plus subscriber-only Debriefs and Q&As to bring you closer to your favorite spies and stories from the show. You’ll also get our exclusive series The Razumov Files and The Great James Bond Car Robbery!


Gadgets & Gifts
Explore a world of secrets together. Navigate through interactive exhibits and missions to discover your spy roles.
Your Q Type
You will be assigned one of ten Q Types - developed with top spy trainers and psychologists to reveal your hidden potential. Not a personality label - a behavioral map of how you think, lead, and perform when it matters.


Stay Connected
Follow us for the latest
TIKTOK
INSTAGRAM
X
FACEBOOK
YOUTUBE