Penetration testing is typically performed by performing systematic attacks using manual or automated technologies for servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of IT. After successfully exploiting vulnerabilities in a particular system, testers try to reach a higher level of security and access sensitive electronic assets through privilege.