Penetration Test
The PT activity goes beyond what is carried out in a normal VA. In this case the Ethical Hacker attempts to force the vulnerabilities detected in order to gain abusive access to a system or compromise the functionality of a service.
If requested, in addition to attempting access, the possibility of increasing privileges and carrying out administrative operations (privilege escalation) on the system and possible propagation (pivoting) on other systems in the network is also evaluated.