Authorized simulated attack on a system to find security vulnerabilities. Like hiring friendly burglars to test your security system and find weaknesses.
Companies hire ethical hackers to perform penetration testing on their web applications before going live.
These services provide security assessment tools that help identify vulnerabilities and ensure compliance, similar to penetration testing.