Involves using automated tools to discover vulnerabilities in computer systems, networks or applications.