Penetration Testing involves finding vulnerabilities within a computer system or web application that can be potentially targeted by hackers, and suggesting ways in which this vulnerabilities can be blocked in order to avoid any future attacks. It is important to note that Penetration Testing must be performed with prior permission (preferably written) from the owner if the target system. Otherwise you may be in legal trouble, if caught, as hacking is a crime in most countries. The vulnerabilities that may occur on a system vary in complexity and the amount of damage that may be caused to the system. It may be something as simple as a weak password that the attacker can guess to gain access to sensitive data, SQL Injection, XSS just to name a few. This are areas that I will cover in future posts. In penetration testing, the core steps are: Reconnaissance It invovles gathering as much information as possible about a potential target before any attack takes place. ...