5 Network Penetration Testing Techniques Everyone Should Know: Pros and Cons of Network Penetration Testing