Goal: Figure out all the vulnerabilities in an asset and document them accordingly.
Goal: Simulate as an attacker to see if we can exploit vulnerabilities. Document both exploited vulnerabilities and false positives.
Key Difference: Penetration testing finds vulnerabilities. Ethical hacking proves which ones are actually exploitable.