A Pen–Test is a formalized set of procedures designed to bypass the security controls of an organizations information system for the purpose of testing its security strength.
A Pen–Test is performed to uncover the security weaknesses of that system and to determine the ways in which it may be compromised by a potential attacker(s).The overall purpose of a Pen–Test is to determine the subject’s ability to withstand an attack by a hostile intruder.