PENETRATION TESTING : DAY X Hi there! My name is John, and today I will be sharing a detailed report on my penetration testing of a web application for Company X. Just to be clear, I am posting this write-up with their consent. Penetration testing typically involves a cyber security specialist attempting to bypass the…