CYBERSECURITY: UNMASKING VULNERABILITIES WITH PENETRATION TESTING