SecPoint Penetrator Methodology