Penetration testing can take different shapes and forms. Sometimes it is just an exterenal vulnerability assessment, sometimes it is vulnerabilithy assessment with manual validation of findings, sometimes we talk about social engineering and in some cases about full size penetration test.
Methodologies
We follow different methodologies selecting the most appropriate as per specific project: PTES, OWASP, OSSTMM