How to Secure Firewalls Through Penetration Testing