Pentester's Guide

HOW TO PWN

According to the Merriam Webster Dictionary:

"Pwn is a lot like own, then, in the sense, 'to have power or mastery over (someone).' (This is, of course, no coincidence. The word likely has its origin in a mistyping of own, what with the p and o being so close to one another on the QWERTY keyboard and all.)

Security experts from Chinese security firm Tencent Keen Security Lab announced on Twitter late Monday night that they had 'pwned Tesla Model S remotely' by exploiting multiple flaws in the latest models running the most recent software.
—Kavita Iyer, TechWorm (techworm.net), 21 Sept. 2016

Here it has to do with hacking—that is, gaining illegal access—to something, such as a computer, or, as above, a car."

The methods of penetrations testing are the same that a hacker will use to gain illicit access into a system.
The difference is that a pen tester will only apply these exploits for the purpose of
security.