An information security expert who performs penetration tests. During the simulated attack on the target computer system, the pentester:
- Collects information about the object
- Searches for entry points
- Gains access to the system
- Maintains a presence in the system
- Removes traces of hacking
The result is a penetration report containing a list of vulnerabilities, sometimes with measures to eliminate them.