Chapter 13 noted that most black hat hackers and security people practice penetration (Pen) attacks at many points on a project. Here, I take this type of attack into a Pen test practice. Penetration is how the hacking world thinks, and we testers need to think like them to be most effective. This chapter deals with Pen attacks as a "special case."
The internal penetration process can access development team information that might take a black hat hacker much longer to obtain; however, ...