{"id":19445,"date":"2024-02-01T10:31:57","date_gmt":"2024-02-01T09:31:57","guid":{"rendered":"https:\/\/www.kyos.ch\/?p=19445"},"modified":"2024-03-13T17:29:08","modified_gmt":"2024-03-13T16:29:08","slug":"the-ultimate-guide-to-pentests","status":"publish","type":"post","link":"https:\/\/staging.kyos.ch\/en\/in-the-news\/the-ultimate-guide-to-pentests\/","title":{"rendered":"Pentests guide: Protecting your systems from cyber threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19445\" class=\"elementor elementor-19445\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7998b8ba elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"7998b8ba\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1dac4395  kyos-vertical-menu elementor-hidden-phone\" data-id=\"1dac4395\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76f8079f kyos-fixed-item elementor-widget elementor-widget-template\" data-id=\"76f8079f\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8783\" class=\"elementor elementor-8783 elementor-8533\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a813e45 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a813e45\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5af3eb\" data-id=\"d5af3eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-26058eb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"26058eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3e54c19\" data-id=\"3e54c19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cde3b2 kyos-fixed-item elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8cde3b2\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/staging.kyos.ch\/kyos\/\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"19.432\" height=\"44.834\" viewBox=\"0 0 19.432 44.834\"><path id=\"Trac&#xE9;_4373\" data-name=\"Trac&#xE9; 4373\" d=\"M7.771,22.432h0L19.432,0H11.687L0,22.432l11.687,22.4h7.745Z\" fill=\"#2d2926\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-48b921f\" data-id=\"48b921f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-390f19f kyos-fixed-item-black elementor-widget elementor-widget-text-editor\" data-id=\"390f19f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a style=\"color: #2d2926!important;\" href=\"\/en\/kyos\/\">About<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6e00f63\" data-id=\"6e00f63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5614e0f0\" data-id=\"5614e0f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dc3d2b2 elementor-widget elementor-widget-heading\" data-id=\"1dc3d2b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Understanding Pentests: A comprehensive guide<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-235f4d57 elementor-align-left elementor-widget elementor-widget-post-info\" data-id=\"235f4d57\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5934c6a elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/staging.kyos.ch\/en\/2024\/02\/01\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>February 1, 2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-6d7e03c elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-clock\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-time\">\n\t\t\t\t\t\t\t\t\t\t<time>10:31 am<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-674a3711 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"674a3711\" data-element_type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\" class=\"attachment-full size-full wp-image-19447\" alt=\"\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg 640w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42235393 elementor-widget elementor-widget-text-editor\" data-id=\"42235393\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s digital landscape, where <strong>cyber threats are ever-evolving<\/strong>, safeguarding your organization&#8217;s critical assets and <b>sensitive information<\/b> is paramount. There is no room for complacency when it comes to security. <b>Pentests<\/b>, short for penetration tests, are a crucial component of your organization&#8217;s overall security strategy, enabling you to proactively identify and address vulnerabilities in your systems and applications. This comprehensive guide will delve deeper into the world of pentests, covering everything from their importance to the different types, process, benefits, and best practices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84351a4 elementor-widget elementor-widget-heading\" data-id=\"84351a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are Pentests and why are they important?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd0b0b elementor-widget elementor-widget-text-editor\" data-id=\"2dd0b0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentests, also known as penetration tests, involve <b>simulating cyber attacks <\/b>on your organization&#8217;s systems and applications within a controlled environment. The primary goal of pentesting is to <b>discover vulnerabilities<\/b> and weaknesses that malicious actors could exploit to gain unauthorized access or compromise sensitive information.<\/p><p>Pentests hold immense importance for various reasons. Firstly, they allow you to <strong>i<\/strong><b>dentify vulnerabilities<\/b> <b>and weaknesses <\/b>before attackers do. By proactively assessing your systems and applications, you can take necessary measures to mitigate these risks, <b>reducing the chances of a successful cyber attack.<\/b><\/p><p>Secondly, pentests are often mandated by regulatory bodies and industry standards such as PCI DSS, HIPAA, and ISO 27001. Compliance with these regulations is critical to avoid penalties and maintain the trust of your customers and partners.<\/p><p>Furthermore, pentests play a vital role in protecting your organization&#8217;s reputation. A successful cyber attack can have devastating consequences, including damage to your brand, loss of customer trust, and legal repercussions. By conducting pentests, you can <b>uncover vulnerabilities<\/b> and address them before they can be exploited, thus <b>safeguarding your organization&#8217;s reputation<\/b>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6a290b elementor-widget elementor-widget-heading\" data-id=\"e6a290b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Types of Pentests<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9db3c elementor-widget elementor-widget-text-editor\" data-id=\"ce9db3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentests come in various forms, each targeting specific areas and objectives. Understanding these types can help you tailor your testing approach to cover all critical aspects of your organization&#8217;s security.<\/p><p><strong>N<\/strong><b>etwork Pentesting<\/b>: This type focuses on testing the security of your network infrastructure. It involves identifying vulnerabilities in network devices, such as routers, switches, and firewalls, and assessing the effectiveness of network security controls.<\/p><p><strong>Web Application Pentesting<\/strong>: Web applications are commonly targeted by attackers. This type of pentesting evaluates the security of your web applications, including identifying vulnerabilities like injection attacks, cross-site scripting (XSS), and insecure authentication mechanisms.<\/p><p><strong>Wireless Pentesting<\/strong>: With the proliferation of wireless networks, assessing their security is crucial. Wireless pentesting involves examining the security controls of your wireless infrastructure, including Wi-Fi networks and associated devices, to identify vulnerabilities and ensure secure configurations.<\/p><p><strong>Mobile Application Pentesting<\/strong>: As mobile applications continue to dominate the digital landscape, it is essential to assess their security. Mobile application pentesting involves analyzing the security posture of your mobile applications, including identifying vulnerabilities specific to mobile platforms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfcb08 elementor-widget elementor-widget-text-editor\" data-id=\"4dfcb08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Table 1: Types of Pentests<\/strong><\/p><p>\u00a0<\/p><table><tbody><tr><td width=\"302\"><p><strong>Type of Pentest<\/strong><\/p><\/td><td width=\"302\"><p><strong>Description<\/strong><\/p><\/td><\/tr><tr><td width=\"302\"><p>Network Pentesting<\/p><\/td><td width=\"302\"><p>Testing the security of a network by attempting to exploit vulnerabilities.<\/p><\/td><\/tr><tr><td width=\"302\"><p>Internal Pentesting<\/p><\/td><td width=\"302\"><p>Testing and identifying vulnerabilities on your LAN that can be used to obtain confidential information and administrative privileges on your domain.<\/p><\/td><\/tr><tr><td width=\"302\"><p>Web Application Pentesting<\/p><\/td><td width=\"302\"><p>Testing the security of a web application by attempting to exploit vulnerabilities.<\/p><\/td><\/tr><tr><td width=\"302\"><p>Wireless Pentesting<\/p><\/td><td width=\"302\"><p>Testing the security of a wireless network by attempting to exploit vulnerabilities.<\/p><\/td><\/tr><tr><td width=\"302\"><p>Mobile Application Pentesting<\/p><\/td><td width=\"302\"><p>Testing the security of a mobile application by attempting to exploit vulnerabilities.<\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-038c6aa elementor-widget elementor-widget-heading\" data-id=\"038c6aa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Severity Ratings<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70d2f6e elementor-widget elementor-widget-text-editor\" data-id=\"70d2f6e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During a pentest, vulnerabilities are assessed based on their severity. Severity ratings help prioritize remediation efforts and determine the level of risk associated with each vulnerability. By assigning severity ratings, organizations can focus on addressing critical vulnerabilities that pose the highest potential impact.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a48ff6e elementor-widget elementor-widget-text-editor\" data-id=\"a48ff6e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Table 2: Severity Ratings<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"302\">\n<p><strong>Rating<\/strong><\/p>\n<\/td>\n<td width=\"302\">\n<p><strong>Description<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"302\">\n<p>Critical<\/p>\n<\/td>\n<td width=\"302\">\n<p>A vulnerability that could lead to a major security breach.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"302\">\n<p>High<\/p>\n<\/td>\n<td width=\"302\">\n<p>A vulnerability that could lead to a significant security breach.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"302\">\n<p>Medium<\/p>\n<\/td>\n<td width=\"302\">\n<p>A vulnerability that could lead to a moderate security breach.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"302\">\n<p>Low<\/p>\n<\/td>\n<td width=\"302\">\n<p>A vulnerability that could lead to a minor security breach.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In the table above, you can see the different severity ratings assigned to vulnerabilities. <b>Critical vulnerabilities<\/b> represent <b>the most severe risks<\/b>, as they have the potential to result in major security breaches. High, medium, and low severity ratings indicate varying levels of risk and potential impact. By understanding these severity ratings, organizations can prioritize remediation efforts and allocate resources effectively to address the most critical vulnerabilities first..<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da68498 elementor-widget elementor-widget-heading\" data-id=\"da68498\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Pentesting Process: A Step-by-Step Guide<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3640ab elementor-widget elementor-widget-text-editor\" data-id=\"b3640ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The pentesting process follows a structured approach, comprising several phases. By understanding each phase, you can ensure a comprehensive and effective pentest.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07a9271 elementor-widget elementor-widget-heading\" data-id=\"07a9271\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 1 - Pre-engagement Activities<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b4f02a elementor-widget elementor-widget-text-editor\" data-id=\"8b4f02a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before commencing the actual testing, several pre-engagement activities should be undertaken:<\/p><p><b>Scoping<\/b>: Clearly define the scope of the pentest, including the systems and applications to be tested, testing methodologies, and the desired testing schedule.<\/p><p><b>Threat Modeling<\/b>: Identify potential threats and attack vectors specific to your organization&#8217;s systems and applications. This helps focus the pentest on the most critical areas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0edf162 elementor-widget elementor-widget-heading\" data-id=\"0edf162\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 2 - Information Gathering<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d16b5be elementor-widget elementor-widget-text-editor\" data-id=\"d16b5be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information gathering is a crucial phase in the pentesting process. It involves collecting relevant information about your organization&#8217;s systems and applications, aiding in the identification of potential vulnerabilities.<\/p><p>\u00a0<\/p><p><b>Open-Source Intelligence (OSINT)<\/b>: Gather information about your organization from publicly available sources, such as social media, job postings, and news articles. This information can provide insights into potential weaknesses.<\/p><p><b>Active Reconnaissance<\/b>: Actively probe your organization&#8217;s systems and applications to identify vulnerabilities and weaknesses. This can include techniques like port scanning and service enumeration.<\/p><p><b>Vulnerability Scanning<\/b>: Utilize automated tools to scan your systems and applications for known vulnerabilities. This process helps identify common security flaws that could be exploited.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-149a34a elementor-widget elementor-widget-heading\" data-id=\"149a34a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 3 - Vulnerability Analysis<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e477550 elementor-widget elementor-widget-text-editor\" data-id=\"e477550\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once the information gathering phase is complete, the pentesters analyze the collected data to <b>identify vulnerabilities <\/b>and weaknesses within your systems and applications. This analysis involves a combination of manual examination and automated testing techniques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51fdcf7 elementor-widget elementor-widget-heading\" data-id=\"51fdcf7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 4 - Exploitation<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c71deb elementor-widget elementor-widget-text-editor\" data-id=\"1c71deb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After <b>vulnerabilities <\/b>have been <b>identified<\/b>, the pentesters proceed to the exploitation phase. Here, they attempt to exploit the identified vulnerabilities in a controlled environment. The objective is to determine if an attacker could successfully exploit these vulnerabilities in<b> real-world scenarios<\/b>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d8eb64 elementor-widget elementor-widget-heading\" data-id=\"3d8eb64\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 5 - Post-Exploitation<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7e16e4 elementor-widget elementor-widget-text-editor\" data-id=\"b7e16e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If a pentester successfully exploits a vulnerability, the post-exploitation phase follows. This stage involves gaining access to the system and attempting to escalate privileges or gain further access to the network. The goal is to simulate the actions of a determined attacker after successfully compromising a system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7af61f5 elementor-widget elementor-widget-heading\" data-id=\"7af61f5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Phase 6 - Reporting<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44c17f4 elementor-widget elementor-widget-text-editor\" data-id=\"44c17f4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The final phase of the pentesting process is reporting. A detailed report is prepared, documenting the vulnerabilities and weaknesses identified during the testing process. The report includes:<\/p><ul><li>Summary of the testing process and methodology<\/li><li>List of identified vulnerabilities and weaknesses<\/li><li>Severity assessment for each vulnerability<\/li><li>Recommendations for remediation, prioritized based on severity<\/li><li>Conclusion and summary of findings<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e35225 elementor-widget elementor-widget-text-editor\" data-id=\"0e35225\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Exemple:<\/strong> Weak Passwords Policy<\/p><p><strong>Recommendations<\/strong>: Implement a password policy that requires strong, long and complex passwords.<\/p><p><strong>Use of Passphrases:<\/strong><\/p><ul><li>Encourage the use of passphrases, which are sentences or phrases composed of multiple words. Passphrases are easier to remember while providing increased security.<\/li><li>Encourage users to include spaces and special characters in their passphrases to enhance complexity. This writing system is called <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Leet_speak\" target=\"_blank\" rel=\"noopener\">Leet speak<\/a>.<\/li><\/ul><p>For frequently used everyday words, consider using passphrases. For all other passwords, it is recommended to use a password manager.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc292e2 elementor-widget elementor-widget-heading\" data-id=\"cc292e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Pentests<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96c01ba elementor-widget elementor-widget-text-editor\" data-id=\"96c01ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentests offer numerous benefits to organizations, allowing them to:<\/p><ul><li>Identify vulnerabilities and weaknesses proactively, reducing the risk of successful attacks.<\/li><li>Meet regulatory compliance requirements and industry standards.<\/li><li>Protect their reputation by demonstrating a commitment to robust security practices.<\/li><li>Improve their overall security posture by addressing identified weaknesses.<\/li><li>Minimize the potential impact and cost of successful cyber attacks.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13b454e elementor-widget elementor-widget-heading\" data-id=\"13b454e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best Practices for Successful Pentests<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0faaa66 elementor-widget elementor-widget-text-editor\" data-id=\"0faaa66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To ensure a successful pentesting process, adhere to these best practices:<\/p><ul><li>Clearly define the scope of the pentest and ensure it aligns with your organization&#8217;s objectives.<\/li><li>Utilize a combination of manual and automated testing techniques for comprehensive coverage.<\/li><li>Engage a qualified and experienced pentesting team to conduct the assessments.<\/li><li>Share the results and recommendations with key stakeholders, including IT personnel and management.<\/li><li>Prioritize the remediation of identified vulnerabilities based on severity and potential impact.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af0d68 elementor-widget elementor-widget-heading\" data-id=\"6af0d68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2673e6b elementor-widget elementor-widget-text-editor\" data-id=\"2673e6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentests play a vital role in protecting organizations from cyber threats by <b>identifying vulnerabilities <\/b>and weaknesses <b>before they can be exploited<\/b>. By following the pentesting process and implementing best practices, organizations can significantly enhance their security posture, meet regulatory requirements, and safeguard their critical assets and sensitive information. Remember, a proactive approach to security is key in today&#8217;s ever-evolving threat landscape. Embrace pentesting as a powerful tool to <b>fortify your organization&#8217;s defenses against cyber threats<\/b>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-183e3206\" data-id=\"183e3206\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-749fdcf2 kyos-fixed-item elementor-widget elementor-widget-template\" data-id=\"749fdcf2\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8782\" class=\"elementor elementor-8782 elementor-8557\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7758e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7758e7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b28947\" data-id=\"2b28947\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69ae174 elementor-widget elementor-widget-text-editor\" data-id=\"69ae174\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More information on this subject?<\/p><p>We are at your disposal!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-991947b elementor-widget elementor-widget-button\" data-id=\"991947b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#kyos-footer-bloc\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Understanding Pentests: A comprehensive guide In today&#8217;s digital landscape, where cyber threats are ever-evolving, safeguarding your organization&#8217;s critical assets and sensitive information is paramount. There is no room for complacency when it comes to security. Pentests, short for penetration tests, are a crucial component of your organization&#8217;s overall security strategy, enabling you to proactively identify [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":19447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-19445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-in-the-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>KYOS - Pentests guide: Protecting your systems from cyber threats<\/title>\n<meta name=\"description\" content=\"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.kyos.ch\/?p=19472\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KYOS - Pentests guide: Protecting your systems from cyber threats\" \/>\n<meta property=\"og:description\" content=\"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.kyos.ch\/?p=19472\" \/>\n<meta property=\"og:site_name\" content=\"KYOS\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-01T09:31:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T16:29:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Etienne Maghakian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Etienne Maghakian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472\"},\"author\":{\"name\":\"Etienne Maghakian\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4\"},\"headline\":\"Pentests guide: Protecting your systems from cyber threats\",\"datePublished\":\"2024-02-01T09:31:57+00:00\",\"dateModified\":\"2024-03-13T16:29:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472\"},\"wordCount\":1425,\"publisher\":{\"@id\":\"https:\/\/staging.kyos.ch\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\",\"articleSection\":[\"In the news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472\",\"url\":\"https:\/\/staging.kyos.ch\/?p=19472\",\"name\":\"KYOS - Pentests guide: Protecting your systems from cyber threats\",\"isPartOf\":{\"@id\":\"https:\/\/staging.kyos.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\",\"datePublished\":\"2024-02-01T09:31:57+00:00\",\"dateModified\":\"2024-03-13T16:29:08+00:00\",\"description\":\"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.kyos.ch\/?p=19472\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#primaryimage\",\"url\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\",\"contentUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg\",\"width\":640,\"height\":427,\"caption\":\"Article-post-Kyos-Pentest\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.kyos.ch\/?p=19472#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.kyos.ch\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentests guide: Protecting your systems from cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.kyos.ch\/#website\",\"url\":\"https:\/\/staging.kyos.ch\/\",\"name\":\"KYOS\",\"description\":\"Better safe than sorry\",\"publisher\":{\"@id\":\"https:\/\/staging.kyos.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.kyos.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.kyos.ch\/#organization\",\"name\":\"KYOS\",\"url\":\"https:\/\/staging.kyos.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png\",\"contentUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png\",\"width\":360,\"height\":80,\"caption\":\"KYOS\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4\",\"name\":\"Etienne Maghakian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g\",\"caption\":\"Etienne Maghakian\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KYOS - Pentests guide: Protecting your systems from cyber threats","description":"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.kyos.ch\/?p=19472","og_locale":"en_US","og_type":"article","og_title":"KYOS - Pentests guide: Protecting your systems from cyber threats","og_description":"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.","og_url":"https:\/\/staging.kyos.ch\/?p=19472","og_site_name":"KYOS","article_published_time":"2024-02-01T09:31:57+00:00","article_modified_time":"2024-03-13T16:29:08+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg","type":"image\/jpeg"}],"author":"Etienne Maghakian","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Etienne Maghakian","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.kyos.ch\/?p=19472#article","isPartOf":{"@id":"https:\/\/staging.kyos.ch\/?p=19472"},"author":{"name":"Etienne Maghakian","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4"},"headline":"Pentests guide: Protecting your systems from cyber threats","datePublished":"2024-02-01T09:31:57+00:00","dateModified":"2024-03-13T16:29:08+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.kyos.ch\/?p=19472"},"wordCount":1425,"publisher":{"@id":"https:\/\/staging.kyos.ch\/#organization"},"image":{"@id":"https:\/\/staging.kyos.ch\/?p=19472#primaryimage"},"thumbnailUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg","articleSection":["In the news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.kyos.ch\/?p=19472","url":"https:\/\/staging.kyos.ch\/?p=19472","name":"KYOS - Pentests guide: Protecting your systems from cyber threats","isPartOf":{"@id":"https:\/\/staging.kyos.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.kyos.ch\/?p=19472#primaryimage"},"image":{"@id":"https:\/\/staging.kyos.ch\/?p=19472#primaryimage"},"thumbnailUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg","datePublished":"2024-02-01T09:31:57+00:00","dateModified":"2024-03-13T16:29:08+00:00","description":"What is pentesting and why is it important? The ultimate guide to Pentests protecting your systems from cyber threats.","breadcrumb":{"@id":"https:\/\/staging.kyos.ch\/?p=19472#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.kyos.ch\/?p=19472"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/?p=19472#primaryimage","url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg","contentUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2024\/01\/Article-post-Kyos-Pentest.jpg","width":640,"height":427,"caption":"Article-post-Kyos-Pentest"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.kyos.ch\/?p=19472#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.kyos.ch\/en\/"},{"@type":"ListItem","position":2,"name":"Pentests guide: Protecting your systems from cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/staging.kyos.ch\/#website","url":"https:\/\/staging.kyos.ch\/","name":"KYOS","description":"Better safe than sorry","publisher":{"@id":"https:\/\/staging.kyos.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.kyos.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.kyos.ch\/#organization","name":"KYOS","url":"https:\/\/staging.kyos.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/","url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png","contentUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png","width":360,"height":80,"caption":"KYOS"},"image":{"@id":"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4","name":"Etienne Maghakian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g","caption":"Etienne Maghakian"}}]}},"_links":{"self":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/19445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/comments?post=19445"}],"version-history":[{"count":32,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/19445\/revisions"}],"predecessor-version":[{"id":19530,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/19445\/revisions\/19530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/media\/19447"}],"wp:attachment":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/media?parent=19445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/categories?post=19445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/tags?post=19445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}