Then we need to start the information gathering process. Here is where the tester puts themselves into the shoes of an illegal hacker. Imagine you're a hacker, and all you have is the name of a company or its website. This company is your target, and your goal now is to take out as much information as you can to help you break into their network.After this, the tester manually tests all of the information gathered for possible leakages in the network. The tester starts by selecting a target. For example, the tester could focus in on the network's main server. From the research done during the hacking, the tester has an arsenal of weapons and potential ways to barge into the network.There are a number of steps involved in the penetration testing. First, you need plan it properly. Before the testing starts, you should set out goals, time tables, and parameters. You should also decide which aspects of your network you want to perform test for, and how long and when the testing will be conducted.