Encryption and Decryption in Penetration Testing