HOW TO IDENTIFY CRITICAL VULNERABILITIES WITH PENETRATION TESTING