Penetration testing, sometimes called pen testing, is a practice by which cyber security professionals evaluate the security of IT infrastructure by trying to exploit vulnerabilities.
Pen testing can be done either by dedicated professionals or through automated technologies.
Targets can include servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of exposure.