👉 Penetration studies usually take place in controlled, secure environments such as company networks, isolated test labs, or virtualized environments. These settings allow security researchers to simulate real-world attacks without risking exposure of live systems. They often use tools and techniques that mimic those used by malicious actors to identify vulnerabilities, but within strict legal and ethical boundaries.