// 1. Methodology
Real penetration test
Hypothesis-driven manual testing. A senior tester forms a theory about how the system breaks, attempts exploitation, and chases what does not add up. Tools like Burp, BloodHound, and custom scripts are inputs to the human's reasoning, not the report itself. Findings include chained exploits where two low-severity issues combine into a critical.
Scanner with a cover page
Automated signature-based scan against a public CVE list. No interpretation, no chaining, no business-logic awareness. The scanner output IS the report. Cover page added. AI-powered platforms add nothing meaningful at the methodology layer; they rephrase the same scanner output in fluent prose.