Types of Penetration Tests
Pentests come in many forms depending on the target and the level of access provided.
Each type plays a role in building a complete security posture.
Pick the right type for the right question.
Access Levels: Black, Grey, White Box
Black Box
No prior access. I simulate an external attacker with zero knowledge. Good for testing public-facing exposure and external resilience.
Grey Box
Partial access. I have limited insider knowledge or credentials. This often represents a realistic, mid-level threat and lets me target both external and some internal controls.
White Box
Full access to source code, credentials, and architecture. This simulates an insider or developer perspective and is best for deep logic, design, and code-level flaws.
These access levels apply across all pentest categories. They shape scope, effort, and what evidence is meaningful.
Pentest Domains
Network Infrastructure
Testing routers, switches, firewalls, and other connected devices. Focus on misconfigurations, weak credentials, outdated firmware, and segmentation flaws. Network tests reveal trust boundaries and how traffic flows between zones.
Web Applications
Websites, APIs, and services exposed to users and attackers alike. Common targets include input validation, authentication, session management, and access controls. Web testing is often high ROI because these services face the public internet.
Mobile Applications
Android and iOS apps shipped with their own quirks. Key areas are local data storage, encryption, communication protocols, and backend interactions. Mobile tests must consider the device context and platform controls.
Cloud Infrastructure
Cloud and hybrid setups shift responsibility and introduce new misconfiguration risks. Targets include VMs, storage buckets, IAM policies, networking, and containerized apps across providers like AWS, Azure, and GCP. Cloud tests often emphasize identity and config hygiene.
Physical Security
Humans are frequently the weakest link. This includes social engineering, badge cloning, tailgating, and bypassing physical controls. To be honest, this is what first drew me to cybersecurity. Physical testing teaches you how policy, process, and tech meet in the real world.
Wireless Networks
Wi-Fi and other wireless protocols can leak signals and trust. Tests cover access point configurations, encryption strength, rogue devices, and authentication mechanisms. Wireless assessments reveal gaps that are invisible from wired tests.
Software
Deep testing of applications, operating systems, and firmware. Focus on code quality, architecture, dependency risks, and secure implementation. This domain blends static analysis, dynamic testing, and manual code review.
Notes for the Lab
- Match access level to the goal. A grey box test can be more realistic than a black box in many orgs.
- Combine domains where it makes sense. Real compromises rarely stop at one boundary.
- Always document scope and expectations for each domain before I start.