Tiny loopholes that can wreak havoc
Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any information about the result of the pentest.