Objective
A global IT consulting and service provider wanted to identify security exploits in applications and systems by purposefully performing malicious techniques using penetration testing methods. They wanted to discover how systems will respond to a real cybersecurity threat and leverage the data to fix the security flaws.