UNMASKING VULNERABILITIES: PENETRATION TESTING FOR SECURE SYSTEMS