Which of the following uses hacking techniques to proactively discover internal vulnerabilities?
- Reverse engineering
- Inbound scanning
- Penetration testing
- Passive reconnaissance