# 🎯 Types of Penetration Testing

- [Network Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/network-penetration-testing.md): Network Pentesting helps uncover vulnerabilities in internal and external infrastructure, testing real attack paths to strengthen overall network security.
- [Network Security Threats: Typical Cyberattacks and How Penetration Testing Mitigates Risk](https://www.penetration-testing.com/types-of-penetration-testing/network-penetration-testing/network-security-threats-typical-cyberattacks-and-how-penetration-testing-mitigates-risk.md): Understanding the most common network attacks targeting organizations, the vulnerabilities they exploit, and how network security assessments help strengthen real-world defenses.
- [Web Application Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/web-application-penetration-testing.md): Web Application Penetration Testing (WAPT) helps uncover vulnerabilities in web applications and APIs, simulating real attack scenarios to strengthen overall application security.
- [Web Application Penetration Testing Proxies: Essential Tools for Security Professionals](https://www.penetration-testing.com/types-of-penetration-testing/web-application-penetration-testing/web-application-penetration-testing-proxies-essential-tools-for-security-professionals.md): Compare Burp Suite, OWASP ZAP, and Caido to find the best HTTP proxy to perform web application pentesting. Which of them aligns with your organizational security demands?
- [Mobile Application Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/mobile-application-penetration-testing.md): Mobile application penetration testing helps organizations identify vulnerabilities in iOS and Android applications, simulating real attack scenarios to strengthen overall mobile security posture.
- [Cloud Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/cloud-penetration-testing.md): Cloud pentesting helps organizations identify vulnerabilities in cloud infrastructure, applications, and configurations, simulating real attack scenarios to strengthen overall cloud security posture.
- [Cloud vs. On-Premise: Which Infrastructure Fits Your Security Strategy?](https://www.penetration-testing.com/types-of-penetration-testing/cloud-vs.-on-premise-which-infrastructure-fits-your-security-strategy.md): Your infrastructure choice doesn't determine your security level; your management practices do. Explore the specific challenges of cloud and on-prem environments to make informed security decisions.
- [Wireless Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/wireless-penetration-testing.md): Wireless penetration testing helps organizations identify vulnerabilities in Wi-Fi networks and wireless infrastructure, simulating real attack scenarios to strengthen wireless security.
- [Social Engineering Penetration Testing](https://www.penetration-testing.com/types-of-penetration-testing/social-engineering-penetration-testing.md): Testing organizational defenses against human-targeted attacks through simulated deception tactics. How does this approach evaluate employee awareness?


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.penetration-testing.com/types-of-penetration-testing.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
