A penetration test, with is also known as a pen-test or ethical hacking, is a simulated attack against your network to check for exploitable vulnerabilities. Information gathered from the pen-test can be used to fine tune web application firewall’s security policies and also patch detected vulnerabilities.
A kill chain is utilized to enumerate the various stages of a pen-test as it pertains to network security. The actual model, the Cyber Kill Chain framework, was developed by Lockheed Martin and is used for identification and prevention of cyber attacks.
The steps in the Cyber Kill Chain trace the typical stages of a cyber attack from early reconnaissance to completion where the attacker achieves full control of the network or computer.