FAQ
Introduction to Pentesting

A penetration test (often called pentest for short) is a controlled, planned and authorized attack on IT systems, applications or networks to identify vulnerabilities before real attackers can find and exploit them.

In general, there are different ways to categorize penetration tests: by their objective and by the amount of information provided by the client. The latter is sometimes also referred to as the penetration test methodology, but this is misleading. The methodology actually describes how the penetration tester proceeds – meaning according to which standard or with what technical process the penetration test itself is conducted.

The amount of information provided is typically classified into Black Box, Gray Box, and White Box testing. In a Black Box penetration test, the tester receives no information from the client, aside from a rough target. In a White Box penetration test, the tester is given full insight into systems, architecture, source code, etc. In a Gray Box penetration test – which is the most commonly used approach – the tester receives more information than would be publicly available. The idea behind this is to enable an effective and efficient execution of the penetration test. For example, during a web application test, the penetration tester might try to guess which database is used. The client can simply inform the tester (even just upon request), saving time and allowing for more targeted testing.

Penetration tests can also be categorized based on the attack vector. Typically, a distinction is made between external and internal penetration tests. An external penetration test is conducted from outside, via the Internet, while an internal penetration test – as you might expect – is carried out from a point inside the company's network. Generally, it is recommended to first perform an external penetration test due to the higher exposure and then follow up with an internal test. However, it is often during internal penetration tests that the most serious security vulnerabilities are discovered.

A Vulnerability Scan is an automated tool that scans web applications, systems, or networks for known vulnerabilities, such as outdated software, missing patches, or misconfigurations. In practice, you input target information (like IP addresses or domain names), click "SCAN," and receive a report listing the identified vulnerabilities. These scans are fully automated and typically limited to detecting previously discovered issues in software components.

A Penetration Test, on the other hand, is a simulated attack on web applications, systems, or networks, also aimed at identifying vulnerabilities. However, it is conducted manually by an experienced penetration tester, who uses a wide range of tools, advanced attack techniques, and a structured testing methodology. This approach makes it possible to uncover new or complex vulnerabilities and potentially exploit them—depending on the defined scope of the test.

Penetration Testing
FAQ

Our FAQ provides clear answers to common questions – straight from pentesting experts and completely ad-free.

binsec FAQ logo

Introduction to Pentesting

What is a penetration test? What types of penetration tests are there? What is the difference between a vulnerability scan and a penetration test? Read more.

Commissioning a Penetration Test

How often should a penetration test be conducted? What data protection regulations are necessary for a penetration test? Read more.

Career Goal: Penetration Tester

How to become a Penetration Tester? Read more.

Penetration Testing

Since 2013 we conduct professional penetration test, based on international industry standards and years of experience in penetration testing, red teaming and hacking.

As a company for professional penetration testing, we do some things differently than other pentest provider: As a penetration test firm, we do not sell vulnerability scans as pentest. We do also focus on business security risks. You are looking for a professionally conducted penetration tests? Get the binsec team for your Pentest. Read more about our pentest service.

Contact us

Pentest Knowledge and Tools

binsec.tools logo

Free pentest tools for your security analysis.

Pentest Tools
binsec.wiki logo

Take a look at our wiki page about pentesting.

Pentest WIKI
binsec FAQ logo

Straight answers to common pentesting questions.

Pentest FAQ

Company

binsec GmbH
Solmsstraße 41
60486 Frankfurt am Main
Germany

Legal notice

Director: Patrick Sauer
Authorised Officer: Florian Zavatzki, Dominik Sauer
Registration: Frankfurt am Main, HRB97277
Turnover Tax Identification No.: DE290966808

© 2025 All rights reserved by binsec GmbH.

© 2025 All rights reserved by binsec GmbH.