This paper describes Penetration Testing Tools and Approaches to finding the vulnerability of any organization Web Application or network. The paper contains the steps for Penetration Testing and how to secure the web application, organization or network. There are many tools are used for vulnerability finding and penetration testing. It contains the Approaches to provide the security solution for network and it’s infra by finding the loopholes. Providing a Network diagram to overcome network traffic. These steps are used in penetration testing is Pre-engagement interaction, information gathering, vulnerability analysis, exploitation of Vulnerability, Reporting. This methodology is used to conduct the Penetration testing of web application and network Auditing. In this paper we are performing Network Audit and give the network solution by reconstructing the network before an attacker are used this vulnerability and exploits it.