Penetration Test Legality
In addition to specifying exactly what a penetration tester will and will not do, the range of IP addresses, subnets, computers, networks, or devices that will undergo penetration testing should also be discussed. If verification and decompilation of software is to be included, the copyright in the software must be reviewed to ensure that …