Discuss how penetration testing and footprinting could be utilized in the topic of (How can cybersecurity professionals prevent hacks? Is the best methodology an offensive or defensive strategy?). Is there a specific tool or particular method that you would utilize?