A test performed to exploit any weaknesses in a system. The goal is to locate risks and vulnerabilities within that computer network along with the exploitation of those located vulnerabilities where appropriate and able.