Penetration testing
Testing to see if you can get in
This may involve social engineering
chnical approach
Physical access
Goal
Assessing weaknesses in a security posture
Understanding risk position better
Accessing systems to find weaknesses
Results
Report detailing findings
Scope
How bih is the bread box?
Any exclusions? Any areas of no-touch?
Must get sign-off from target organiwation
Always get approval from the RIGHT people