Defense & Operations
Penetration Testing
Also known as: Pentest, Ethical hacking, Offensive security testing
Definition
An authorized, simulated cyberattack against systems, applications, or people to identify exploitable weaknesses before real adversaries do.
Examples
- An external network pentest that gains initial access via an exposed VPN appliance and pivots to domain admin.
- A web application pentest that chains an IDOR with a stored XSS to take over administrator accounts.
Related terms
Vulnerability Assessment
A systematic review of an environment to identify, classify, and prioritize security weaknesses, typically without active exploitation.
Red Team
Red Team — definition coming soon.
Vulnerability Scanning
Automated process that probes systems, applications, or containers against known vulnerability signatures to produce a list of potential weaknesses.
Attack Surface Management (ASM)
Continuous discovery, inventory, classification, and monitoring of all assets that expose an organization to potential cyberattack.
Purple Team
Purple Team — definition coming soon.
Security Posture
Security Posture — definition coming soon.