A penetration tester starts by defining the test’s scope, objectives, and boundaries to stay aligned with regulations and industry standards. Setting clear rules of engagement, securing agreements like NDAs, and choosing the right targets ensures a legal and effective test. Different assessments—such as vulnerability, network, application, and API testing—cover specific security areas for a full risk overview. A shared responsibility model keeps everyone on the same page, while ethical and legal requirements, like authorization letters and reporting standards, are strictly followed. Careful documentation ensures a structured, transparent, and secure testing process.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Define the Scope

The scope is the "North Star" of the engagement. It defines what is fair game and what is strictly off-limits to prevent downtime or legal issues.

2. Compare Types of Assessments

Some of the more common types of assessments are as follows:

Choosing the right "Box" determines how much information the tester starts with and how realistic the simulation is.

Type Knowledge Provided Goal
Black Box Zero knowledge Simulates an external, unauthenticated attacker
Gray Box Partial knowledge Simulates a disgruntled employee or a focused breach.
White Box Full knowledge Comprehensive audit; finding "needle in the haystack" bugs.

3. Utilize the Shared Responsibility Model

When testing Cloud environments (AWS, Azure, GCP), you must understand where the client's authority ends and the provider's begins.