This practice involves exploiting the vulnerabilities of a network. These tests can help identify security flaws in your network before…