https://jon.sprig.gs/blog/post/905
What happens on an IT Penetration Test