PENETRATING WEAKNESSES: PENETRATION TESTING FOR SECURE SYSTEMS