A few penetration tests are related to what is being tested: internal network, external network, wireless, network, web application, mobile application, and cryptocurrency network. A penetration test includes automated tools to identify potential vulnerabilities, manually verified, and then exploited. A pen tester will attempt to compromise credentials through trying standard logins or collecting password hashes and obtain access to systems within the test scope. These testers do not do anything malicious but can point out the potential risks if vulnerabilities are leveraged. The focus of physical penetration testing is the physical controls around a location or where sensitive data exists.