Security assessments and penetration testing. Poking websites and devices until they pop, break, leak or die in a way that identifies a security vulnerability.