We simulate the intrusion of hackers to conduct a comprehensive penetration test from multiple channels such as websites, servers, internal, external, people, mobile and clients. Tests include whether the security mechanism may be bypassed, whether the business process is reasonable, whether the external attacks could be blocked, whether the security conscious exists, and whether the core data is safe.