A network penetration test is conducted to identify any weaknesses in network systems, notably devices, switches, routers and hosting facilities. A pen test on a network allows us to identify such vulnerabilities before they can be exploited by a hacker in the real world.
A network pet test will most likely uncover common vulnerabilities that a malicious user would exploit. Such vulnerabilities include outdated software, authentication issues, configuration issues on the network or with websites, emails or hosting.
A penetration test will begin by scanning for vulnerabilities but once an attacker is inside they may well be able to move laterally within the network. This is a key part of the penetration test.