Computer External Penetration Testing Steps