{"id":7163,"date":"2022-09-07T10:49:49","date_gmt":"2022-09-07T07:49:49","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7163"},"modified":"2022-09-07T11:18:21","modified_gmt":"2022-09-07T08:18:21","slug":"penetration-tests","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/penetration-tests","title":{"rendered":"Penetration tests"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7163\" class=\"elementor elementor-7163 elementor-5349\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2683a6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c2683a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d000ccb ot-flex-column-vertical\" data-id=\"d000ccb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec2be09 elementor-widget elementor-widget-iheading\" data-id=\"ec2be09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Proactive security testing<\/span>\r\n\t        <h2 class=\"main-heading\">Penetration Tests<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93835a4 elementor-widget elementor-widget-heading\" data-id=\"93835a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Our organization has many years of experience in conducting penetration testing. We divide this service into several types, depending on the scope of the tests as well as the attack vectors.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d0a1d69 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d0a1d69\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-af54cb0 ot-flex-column-vertical\" data-id=\"af54cb0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10f3659 elementor-widget elementor-widget-iserv_box\" data-id=\"10f3659\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-float\">\r\n\t\t\t<a href=\"#web-pentest\" class=\"overlay\"><\/a>\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Web Application Penetration Test<\/h5>\r\n\t            \t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-50ace5f ot-flex-column-vertical\" data-id=\"50ace5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ecd490 elementor-widget elementor-widget-iserv_box\" data-id=\"6ecd490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-float\">\r\n\t\t\t<a href=\"#network-pentest\" class=\"overlay\"><\/a>\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>External Network Penetration Test<\/h5>\r\n\t            \t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d6dd895 ot-flex-column-vertical\" data-id=\"d6dd895\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0793fe7 elementor-widget elementor-widget-iserv_box\" data-id=\"0793fe7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-float\">\r\n\t\t\t<a href=\"#network-pentest\" class=\"overlay\"><\/a>\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-iot\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Internal Network Penetration Test<\/h5>\r\n\t            \t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cf364b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1cf364b\" data-element_type=\"section\" data-e-type=\"section\" id=\"web-pentest\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8c8e883 ot-flex-column-vertical\" data-id=\"8c8e883\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a7c5c94 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"a7c5c94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7bfa63d ot-flex-column-vertical\" data-id=\"7bfa63d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b90f24e elementor-widget elementor-widget-iheading\" data-id=\"b90f24e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Security tests of web applications and web services<\/span>\r\n\t        <h2 class=\"main-heading\">Web Penetration Test<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-629a152 elementor-widget elementor-widget-text-editor\" data-id=\"629a152\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This service is a combination of automated and manual testing (our policy is to prioritize the latter). The main purpose of conducting this type of service is the proactive detection of weaknesses in information security and vulnerabilities in an organization.<\/p><p>The way this service works is as follows:<\/p><ol><li>Reconnaissance is conducted to identify services, technologies, including their versions, how they are configured and how they work.<\/li><li>An initial automated scan for vulnerabilities is performed with a minimum of 2 popular scanners such as Acunetix and Netsparker.<\/li><li>The results of an automatic scan, as well as the findings of our specialists, are verified and the collected information is used for subsequent actions aimed at obtaining access in one way or another.<\/li><li>A comprehensive application security review is performed within the agreed scope, using our checklist of checks and vulnerability detection methods aligned with global standards and best practices.<\/li><li>An attempt is made to escalate access using the vulnerabilities found.<\/li><li>A final report is prepared, which includes detailed information on all vulnerabilities found, as well as recommendations for remediation, references, etc. The report also includes a section dedicated to people management, in which everything is described in detail with as little technical language and terminology as possible.<\/li><li>After agreeing on a period for removal, the customer has the opportunity to receive a retest of the agreed scope within 6 months of the initial tests being carried out completely free of charge.<\/li><li>A retest report is being prepared.<\/li><\/ol><p>Our methodology for performing penetration tests is in line with leading ones, necessarily including the following phases:<\/p><p><strong>Phase 1:<\/strong> Reconnaissance<br \/><strong>Phase 2:<\/strong> Scan<br \/><strong>Phase 3:<\/strong> Gaining Access<br \/><strong>Phase 4:<\/strong> Escalation of Privileges<\/p><p><strong>Types of web penetration tests, according to the level of access:<\/strong><\/p><p><strong>Black box test<\/strong><br \/>No prior knowledge of technology or the exact scope of a company is required. No access to the given application or system needs to be granted. The results are based on the initial access that our specialists had.<\/p><p><strong>Gray box test<\/strong><br \/>It is possible to grant partial client-side access to in-scope applications. Partial technology and infrastructure information is provided for the applications in scope. It is recommended to use this approach for business applications as well as applications that are only used by people with pre-granted access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-846ff0b ot-flex-column-vertical\" data-id=\"846ff0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f47b16 elementor-widget elementor-widget-image\" data-id=\"5f47b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-1024x1024.png\" class=\"attachment-large size-large wp-image-6450\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Secure-data-bro.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59521ad elementor-widget elementor-widget-image\" data-id=\"59521ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-1024x1024.png\" class=\"attachment-large size-large wp-image-6449\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Search-engines-bro.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e87b11a elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"e87b11a\" data-element_type=\"section\" data-e-type=\"section\" id=\"network-pentest\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-338ed27 ot-flex-column-vertical\" data-id=\"338ed27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a54810f elementor-widget elementor-widget-iheading\" data-id=\"a54810f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Security tests of networks and services<\/span>\r\n\t        <h2 class=\"main-heading\">Network Penetration Test<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8684202 elementor-widget elementor-widget-text-editor\" data-id=\"8684202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Network penetration tests examine the security of an organization&#8217;s internal and public networks, as well as related services. The service is recommended for companies that have a large range of public services and available public IPv4 addresses. Another type of company for which this service would be useful are those that have large internal networks with multiple services and important information.<\/p><p>Both web penetration tests and network penetration tests have 2 divisions.<\/p><p><strong>\/\/ Internal network penetration test<\/strong><\/p><p>With this service, our specialists get access to the company&#8217;s internal network via VPN or physically. Penetration attempts include a large set of checks for misconfiguration of your services, insufficient efforts to improve security, presence of publicly known vulnerabilities, and many other checks that are performed by specialists, not just vulnerability scanning software).<\/p><p>One of the goals of this service is for our specialists to find as many security gaps as possible in all your services and systems and to fix them in advance. Another aspect that most companies miss is that sometimes the employees themselves are the main security risk factor. We try to play out possible scenarios that could clearly show how so-called rogue employees can compromise the security of your company.<\/p><p>The tests that our specialists conduct also focus on the risks of unauthorized individuals &#8220;spreading into your network&#8221; using employee credentials that have already been compromised or other vulnerabilities.<\/p><p><strong>\/\/ External network penetration test<\/strong><\/p><p>Most organizations have multiple public servers, services, and systems that are accessed by employees, customers, and partners alike. The public IT asset security testing service focuses on surveying the following:<\/p><ul><li>Discovery of endpoints, domains and subdomains<br \/>Identify services, ports, technologies, versions, service providers<\/li><li>Scan for ports and their configuration in the firewall<\/li><li>Identify services and their versions and configuration<\/li><li>Automated testing against all public and available vulnerabilities<\/li><li>Manual vulnerability detection<\/li><li>Verification of discovered vulnerabilities<\/li><li>Exploitation of discovered vulnerabilities, through public or private exploits<\/li><li>Using specific or proprietary scripts to exploit vulnerabilities or security flaws<\/li><li>Escalating access through compromised initials or access keys<\/li><\/ul><p>Both internal penetration testing and external penetration testing are performed using our checklist, which has been developed over years and is proven to produce good results.<\/p><p>For any service that has a web interface, tests are performed that overlap with those of the web penetration test, given the fact that many services nowadays use a web environment that is designed for the user.<\/p><p>Similar to web penetration tests, a detailed report is issued upon completion that includes the following points:<\/p><ul><li>Summary (a detailed description of the findings and conclusions, using as little technical language and terminology as possible.)<\/li><li>Information Gathering<\/li><li>Risk Assessment<\/li><li>Methodology<\/li><li>Scope and objectives<\/li><li>Checklist, depending on the type of service<\/li><li>Every vulnerability found, with full description, references, screenshots, remediation instructions.<\/li><li>Positive characteristics and conclusions<\/li><li>Recommendations (concluded in 3 categories, according to the findings during the test &#8211; short-term, medium-term and long-term)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2caa9b2 ot-flex-column-vertical\" data-id=\"2caa9b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa4667b elementor-widget elementor-widget-image\" data-id=\"fa4667b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1.png\" class=\"attachment-full size-full wp-image-6459\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1.png 2000w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-status-bro-1-720x720.png 720w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06bc4ca elementor-widget elementor-widget-image\" data-id=\"06bc4ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro.png\" class=\"attachment-full size-full wp-image-6461\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro.png 2000w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Server-bro-720x720.png 720w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Proactive security testing Penetration Tests Our organization has many years of experience in conducting penetration testing. We divide this service into several types, depending on the scope of the tests as well as the attack vectors. Web Application Penetration Test External Network Penetration Test Internal Network Penetration Test \/\/ Security tests of web applications [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7163","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7163"}],"version-history":[{"count":11,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7163\/revisions"}],"predecessor-version":[{"id":7175,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7163\/revisions\/7175"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}