Vulnerability Assessment and Penetration Testing (VAPT) are two different but related security testing methodologies used to assess the security of a computer system or network.
Vulnerability Assessment (VA) is the process of identifying and quantifying security vulnerabilities in a system or network. It typically involves using automated tools and techniques to scan for known vulnerabilities in the system or network, such as missing patches or misconfigured settings. The goal of a vulnerability assessment is to identify potential weaknesses in the system that could be exploited by attackers.
Penetration Testing (PT) is a more comprehensive testing methodology that simulates an actual attack on a system or network. It involves identifying and exploiting vulnerabilities to gain access to the system or network, and then attempting to escalate privileges and access sensitive information. The goal of a penetration test is to identify the actual impact of a vulnerability and the extent to which an attacker could compromise the system.
Vulnerability assessments and penetration testing are often combined into a single testing process known as VAPT. This approach provides a more comprehensive and realistic assessment of the security of a system or network.
The VAPT process typically includes
the following steps:

Planning
This involves defining the scope and objectives of the testing, identifying the tools and techniques that will be used, and establishing a testing schedule.

Information gathering
This involves collecting information about the system or network being tested, such as IP addresses, network topology, and operating system versions.

Vulnerability assessment
This involves using automated tools and techniques to scan for known vulnerabilities in the system or network.

Penetration testing
This involves attempting to exploit identified vulnerabilities to gain access to the system or network and to escalate privileges.

Reporting
This involves documenting the findings of the testing, including the vulnerabilities that were identified, the impact of those vulnerabilities, and recommendations for remediation.

Remediation
This involves addressing the vulnerabilities that were identified through the testing process, such as by applying software patches, reconfiguring settings, or implementing additional security controls.
