{"id":1934,"date":"2025-07-28T20:38:16","date_gmt":"2025-07-28T18:38:16","guid":{"rendered":"https:\/\/net-e.de\/?page_id=1934"},"modified":"2025-07-29T09:39:22","modified_gmt":"2025-07-29T07:39:22","slug":"penetrationstesting","status":"publish","type":"page","link":"https:\/\/net-e.de\/de\/penetrationstesting\/","title":{"rendered":"penetrationstesting"},"content":{"rendered":"\n<style type=\"text\/css\">\n\t#hero-small-block_ad839b980b6e42470cc05321db75681c {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Small Hero******************* -->\n<div id=\"hero-small-block_ad839b980b6e42470cc05321db75681c\" class=\"block-hero-small alignfull\">\n\n\t\t\t<div class=\"jumbotron jumbotron-small d-flex align-items-center text-center rounded-0 px-0\" style=\"background-image: url('https:\/\/net-e.de\/wp-content\/uploads\/2021\/12\/img_head-start.svg');\">\n\n\t\t\t<div class=\"container-fluid overlay\">\n\t\t\t\t<div class=\"row h-100\">\n\t\t\t\t\t<div class=\"col-12 overlay-col\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"container container-mt text-container\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t<div class=\"font-small-hero-responsive regular text-white text-left w-75\">\n\t\t\t\t\t\t\t<b style=\"color:#cc5e24\">Penetrationstests \u2013 Ihre IT auf dem Pr\u00fcfstand<\/b> \t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_9248173991ecfbdbd2cd1ea9a0723cdd {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_9248173991ecfbdbd2cd1ea9a0723cdd\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container \">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\" col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"330\" data-end=\"385\"><span style=\"color: #cc5e24\"><strong data-start=\"334\" data-end=\"385\">Sicherheitsl\u00fccken erkennen, bevor es andere tun<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<p data-start=\"387\" data-end=\"695\">In einer digitalen Welt, in der Cyberangriffe zur allt\u00e4glichen Bedrohung geworden sind, ist IT-Sicherheit keine Option, sondern Pflicht. Mit einem <strong data-start=\"534\" data-end=\"564\">Penetrationstest (Pentest)<\/strong> pr\u00fcfen wir Ihre Systeme gezielt auf Schwachstellen \u2013 unter realen Bedingungen und mit dem Know-how erfahrener Sicherheitsexperten.<\/p>\n<p data-start=\"697\" data-end=\"869\">Ziel ist es, Angriffsfl\u00e4chen fr\u00fchzeitig zu erkennen, Risiken zu bewerten und konkrete Handlungsempfehlungen zur Absicherung zu liefern<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_a372b7c1bb0cb10e12420fb248a68472 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_a372b7c1bb0cb10e12420fb248a68472\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container \">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg 2560w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-300x200.jpg 300w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1024x683.jpg 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-768x512.jpg 768w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1536x1024.jpg 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-2048x1365.jpg 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"876\" data-end=\"913\"><span style=\"color: #cc5e24\"><strong data-start=\"880\" data-end=\"913\">Was ist ein Penetrationstest?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<p data-start=\"915\" data-end=\"1348\">Ein Penetrationstest ist eine kontrollierte Angriffssimulation auf Ihre IT-Systeme. Dabei analysieren unsere zertifizierten Experten Ihre Infrastruktur aus Sicht eines echten Angreifers \u2013 entweder von au\u00dfen (externe Tests) oder aus dem internen Netzwerk (interne Tests). Auch Webanwendungen, mobile Apps, WLANs oder menschliche Schwachstellen (Social Engineering) k\u00f6nnen gezielt \u00fcberpr\u00fcft werden.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_b9076bfe8c088a5368e5a1d701281a54 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_b9076bfe8c088a5368e5a1d701281a54\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container \">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\" col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"1355\" data-end=\"1392\"><span style=\"color: #cc5e24\"><strong data-start=\"1359\" data-end=\"1392\">Unsere Testarten im \u00dcberblick<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<p data-start=\"1394\" data-end=\"1485\">Wir bieten verschiedene Penetrationstests \u2013 abgestimmt auf Ihre Umgebung und Anforderungen:<\/p>\n<ul data-start=\"1487\" data-end=\"2147\">\n<li data-start=\"1487\" data-end=\"1581\">\n<p data-start=\"1489\" data-end=\"1581\"><strong data-start=\"1489\" data-end=\"1509\">Externer Pentest<\/strong>: Pr\u00fcfung \u00f6ffentlich erreichbarer Systeme (z.\u202fB. Webseiten, VPN, E-Mail)<\/p>\n<\/li>\n<li data-start=\"1582\" data-end=\"1679\">\n<p data-start=\"1584\" data-end=\"1679\"><strong data-start=\"1584\" data-end=\"1604\">Interner Pentest<\/strong>: Angriffssimulation mit internem Zugang, z.\u202fB. \u00fcber kompromittierte Ger\u00e4te<\/p>\n<\/li>\n<li data-start=\"1680\" data-end=\"1767\">\n<p data-start=\"1682\" data-end=\"1767\"><strong data-start=\"1682\" data-end=\"1703\">Webanwendungstest<\/strong>: Analyse auf XSS, SQL-Injection, Authentifizierungsfehler &amp; Co.<\/p>\n<\/li>\n<li data-start=\"1768\" data-end=\"1840\">\n<p data-start=\"1770\" data-end=\"1840\"><strong data-start=\"1770\" data-end=\"1789\">Mobile App-Test<\/strong>: Sicherheitspr\u00fcfung Ihrer iOS-\/Android-Anwendungen<\/p>\n<\/li>\n<li data-start=\"1841\" data-end=\"1918\">\n<p data-start=\"1843\" data-end=\"1918\"><strong data-start=\"1843\" data-end=\"1863\">Netzwerk-Pentest<\/strong>: Analyse von Firewalls, Routern und Zugriffskontrollen<\/p>\n<\/li>\n<li data-start=\"1919\" data-end=\"2007\">\n<p data-start=\"1921\" data-end=\"2007\"><strong data-start=\"1921\" data-end=\"1941\">Wireless-Pentest<\/strong>: Test kabelloser Netzwerke auf Zugriffs- und Konfigurationsfehler<\/p>\n<\/li>\n<li data-start=\"2008\" data-end=\"2147\">\n<p data-start=\"2010\" data-end=\"2147\"><strong data-start=\"2010\" data-end=\"2037\">Social Engineering Test<\/strong>: Simulation menschlicher Angriffsvektoren wie Phishing oder menschlichen Einbruchsversuchen<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1232\" height=\"928\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2.png 1232w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-300x226.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-1024x771.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-768x578.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-16x12.png 16w\" sizes=\"(max-width: 1232px) 100vw, 1232px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_8375fe1137e22544daa333413160d4c3 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_8375fe1137e22544daa333413160d4c3\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container \">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"6424\" height=\"5400\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1.png 6424w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-300x252.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-1024x861.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-768x646.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-1536x1291.png 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-2048x1722.png 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-14x12.png 14w\" sizes=\"(max-width: 6424px) 100vw, 6424px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2154\" data-end=\"2221\"><span style=\"color: #cc5e24\"><strong data-start=\"2158\" data-end=\"2221\">Ablauf eines Penetrationstests \u2013 transparent &amp; strukturiert<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"2154\" data-end=\"2221\"><\/h3>\n<ol data-start=\"2223\" data-end=\"2851\">\n<li data-start=\"2223\" data-end=\"2312\">\n<p data-start=\"2226\" data-end=\"2312\"><strong data-start=\"2226\" data-end=\"2254\">Planung &amp; Zieldefinition<\/strong><br data-start=\"2254\" data-end=\"2257\" \/>Gemeinsame Festlegung von Umfang, Methode und Zielen<\/p>\n<\/li>\n<li data-start=\"2314\" data-end=\"2397\">\n<p data-start=\"2317\" data-end=\"2397\"><strong data-start=\"2317\" data-end=\"2344\">Informationsbeschaffung<\/strong><br data-start=\"2344\" data-end=\"2347\" \/>Sammeln \u00f6ffentlich und intern verf\u00fcgbarer Daten<\/p>\n<\/li>\n<li data-start=\"2399\" data-end=\"2494\">\n<p data-start=\"2402\" data-end=\"2494\"><strong data-start=\"2402\" data-end=\"2427\">Schwachstellenanalyse<\/strong><br data-start=\"2427\" data-end=\"2430\" \/>Kombination aus automatisierten Scans und manuellen Pr\u00fcfungen<\/p>\n<\/li>\n<li data-start=\"2496\" data-end=\"2589\">\n<p data-start=\"2499\" data-end=\"2589\"><strong data-start=\"2499\" data-end=\"2521\">Angriffssimulation<\/strong><br data-start=\"2521\" data-end=\"2524\" \/>Durchf\u00fchrung realit\u00e4tsnaher Angriffe zur Bewertung der Risiken<\/p>\n<\/li>\n<li data-start=\"2591\" data-end=\"2690\">\n<p data-start=\"2594\" data-end=\"2690\"><strong data-start=\"2594\" data-end=\"2620\">Bericht &amp; Empfehlungen<\/strong><br data-start=\"2620\" data-end=\"2623\" \/>Ausf\u00fchrliche Dokumentation inkl. Priorisierung und Ma\u00dfnahmenplan<\/p>\n<\/li>\n<li data-start=\"2692\" data-end=\"2851\">\n<p data-start=\"2695\" data-end=\"2851\"><strong data-start=\"2695\" data-end=\"2729\">Pr\u00e4sentation &amp; Nachbesprechung<\/strong><br data-start=\"2729\" data-end=\"2732\" \/>Klar verst\u00e4ndliche Auswertung mit Raum f\u00fcr R\u00fcckfragen und Strategieempfehlungen<\/p>\n<\/li>\n<\/ol>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_555eed977f6cd540abf45e9919222799 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_555eed977f6cd540abf45e9919222799\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container \">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\" col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2858\" data-end=\"2907\"><span style=\"color: #cc5e24\"><strong data-start=\"2862\" data-end=\"2907\">Testmethoden \u2013 angepasst an Ihre Realit\u00e4t<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"2858\" data-end=\"2907\"><\/h3>\n<ul data-start=\"2909\" data-end=\"3161\">\n<li data-start=\"2909\" data-end=\"2977\">\n<p data-start=\"2911\" data-end=\"2977\"><strong data-start=\"2911\" data-end=\"2923\">Blackbox<\/strong>: Test ohne Vorkenntnisse \u2013 wie ein externer Angreifer<\/p>\n<\/li>\n<li data-start=\"2978\" data-end=\"3048\">\n<p data-start=\"2980\" data-end=\"3048\"><strong data-start=\"2980\" data-end=\"2992\">Whitebox<\/strong>: Vollst\u00e4ndige Informationen \u2013 tiefgehende Systemanalyse<\/p>\n<\/li>\n<li data-start=\"3049\" data-end=\"3161\">\n<p data-start=\"3051\" data-end=\"3161\"><strong data-start=\"3051\" data-end=\"3062\">Greybox<\/strong>: Teilinformationen \u2013 gezielter Test mit realistischem Zugriff<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3163\" data-end=\"3166\" \/>\n<h3 data-start=\"3168\" data-end=\"3219\"><span style=\"color: #cc5e24\"><strong data-start=\"3172\" data-end=\"3219\">Mehr als nur ein Test: Optionale Leistungen<\/strong><\/span><\/h3>\n<ul data-start=\"3221\" data-end=\"3623\">\n<li data-start=\"3221\" data-end=\"3292\">\n<p data-start=\"3223\" data-end=\"3292\"><strong data-start=\"3223\" data-end=\"3233\">Retest<\/strong>: Nachkontrolle zur Verifikation behobener Schwachstellen<\/p>\n<\/li>\n<li data-start=\"3293\" data-end=\"3366\">\n<p data-start=\"3295\" data-end=\"3366\"><strong data-start=\"3295\" data-end=\"3311\">Blue Teaming<\/strong>: Unterst\u00fctzung bei der Umsetzung der Schutzma\u00dfnahmen<\/p>\n<\/li>\n<li data-start=\"3367\" data-end=\"3441\">\n<p data-start=\"3369\" data-end=\"3441\"><strong data-start=\"3369\" data-end=\"3398\">Workshops &amp; Live-Hackings<\/strong>: Sensibilisierung durch praxisnahe Demos<\/p>\n<\/li>\n<li data-start=\"3442\" data-end=\"3516\">\n<p data-start=\"3444\" data-end=\"3516\"><strong data-start=\"3444\" data-end=\"3469\">Phishing-Simulationen<\/strong>: Test der menschlichen Sicherheitskomponente<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-scaled.jpg\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-scaled.jpg 2560w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-300x225.jpg 300w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-1024x768.jpg 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-768x576.jpg 768w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-1536x1152.jpg 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-2048x1536.jpg 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-16x12.jpg 16w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_7a24bb07146fba08684bbe98495b3d21 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_7a24bb07146fba08684bbe98495b3d21\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container \">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-300x300.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-150x150.png 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-768x768.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-12x12.png 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"3914\" data-end=\"3968\"><span style=\"color: #cc5e24\"><strong data-start=\"3918\" data-end=\"3968\">Bereit f\u00fcr den Praxistest Ihrer IT-Sicherheit?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"3630\" data-end=\"3661\"><span style=\"color: #cc5e24\"><strong data-start=\"3634\" data-end=\"3661\">Ihre Vorteile mit net.e<\/strong><\/span><\/h3>\n<ul>\n<li data-start=\"3663\" data-end=\"3907\">Realit\u00e4tsnahe Angriffssimulationen<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Durchf\u00fchrung durch erfahrene und zertifizierte IT-Sicherheitsexperten<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Individuell zugeschnittene Testkonzepte<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Verst\u00e4ndliche Berichte &amp; klare Ma\u00dfnahmenempfehlungen<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Unterst\u00fctzung bei ISO 27001, DSGVO, BSI u.v.m.<\/li>\n<\/ul>\n<p data-start=\"3970\" data-end=\"4122\">Ob aus Eigeninitiative oder zur Erf\u00fcllung regulatorischer Anforderungen \u2013 ein Penetrationstest ist der erste Schritt in Richtung proaktive Sicherheit.<\/p>\n<p data-start=\"4124\" data-end=\"4256\"><strong data-start=\"4127\" data-end=\"4150\">Sprechen Sie uns an<\/strong> \u2013 wir beraten Sie gerne pers\u00f6nlich und erstellen ein auf Ihre Systeme und Ziele abgestimmtes Testkonzept.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0 \">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\" font-size-12 line-height-18 medium pr-2\">Termin buchen<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewBox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_b6804ff65f8ccfb29ae6eb864d366ebb {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_b6804ff65f8ccfb29ae6eb864d366ebb\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container \">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\" col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p><span style=\"color: #cc5e24\"><strong>Unverbindliches Beratungsgespr\u00e4ch<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"144\" data-end=\"194\"><span style=\"color: #cc5e24\"><strong data-start=\"148\" data-end=\"194\">Jetzt unverbindliches Gespr\u00e4ch vereinbaren<\/strong><\/span><\/h3>\n<p data-start=\"196\" data-end=\"482\">Sie m\u00f6chten herausfinden, wie ein Penetrationstest konkret in Ihrem Unternehmen ablaufen kann? In einem unverbindlichen Erstgespr\u00e4ch kl\u00e4ren wir gemeinsam Ihre Anforderungen, zeigen m\u00f6gliche Testvarianten auf und beantworten Ihre Fragen \u2013 <strong data-start=\"434\" data-end=\"481\">transparent, verst\u00e4ndlich und auf Augenh\u00f6he<\/strong>.<\/p>\n<p data-start=\"484\" data-end=\"595\"><strong data-start=\"487\" data-end=\"533\">Sicherheit beginnt mit dem ersten Schritt.<\/strong><\/p>\n<p data-start=\"484\" data-end=\"595\"><strong data-start=\"539\" data-end=\"595\">Jetzt Termin sichern und IT-Risiken gezielt angehen.<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0 \">\n\n\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t<span class=\" font-size-12 line-height-18 medium pr-2\">Termin buchen<\/span>\n\n\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewBox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2.jpeg\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2.jpeg 200w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2-150x150.jpeg 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2-12x12.jpeg 12w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p> [&#8230;]<\/p>\n<p><a class=\"btn btn-post-read-more mt-5 p-0 d-flex justify-content-center align-items-center\" href=\"https:\/\/net-e.de\/de\/penetrationstesting\/\"><span class=\"ml-auto\">Vollst\u00e4ndiger Bericht<\/span> <span class=\"read-more-inner position-relative ml-auto\"><br \/>\n\t\t\t<svg class=\"position-absolute arrow-down\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"13.707\" height=\"16.707\" viewBox=\"0 0 13.707 16.707\">\n\t\t\t  <g id=\"ic-roundabout-forward\" transform=\"translate(13.351 -10) rotate(90)\">\n\t\t\t    <path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36l6.5,6.4-6.5,6.6\" transform=\"translate(-434.5 -0.36)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t    <line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(10 6.5)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t  <\/g>\n\t\t\t<\/svg><br \/>\n\t\t\t<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/default-skeleton.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1934","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>penetrationstesting | net.e<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/net-e.de\/de\/penetrationstesting\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"penetrationstesting | net.e\" \/>\n<meta property=\"og:description\" content=\"[...]Vollst\u00e4ndiger Bericht\" \/>\n<meta property=\"og:url\" content=\"https:\/\/net-e.de\/de\/penetrationstesting\/\" \/>\n<meta property=\"og:site_name\" content=\"net.e\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T07:39:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\",\"name\":\"penetrationstesting | net.e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\"},\"datePublished\":\"2025-07-28T18:38:16+00:00\",\"dateModified\":\"2025-07-29T07:39:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/net-e.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"penetrationstesting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"name\":\"net.e\",\"description\":\"net.e - unabh\u00e4ngige IT Beratung aus Aurich\",\"publisher\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/net-e.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\",\"name\":\"net.e - Network Experts GmbH\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"width\":4744,\"height\":2680,\"caption\":\"net.e - Network Experts GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"penetrationstesting | net.e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/net-e.de\/de\/penetrationstesting\/","og_locale":"de_DE","og_type":"article","og_title":"penetrationstesting | net.e","og_description":"[...]Vollst\u00e4ndiger Bericht","og_url":"https:\/\/net-e.de\/de\/penetrationstesting\/","og_site_name":"net.e","article_modified_time":"2025-07-29T07:39:22+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/net-e.de\/penetrationstesting\/","url":"https:\/\/net-e.de\/penetrationstesting\/","name":"penetrationstesting | net.e","isPartOf":{"@id":"https:\/\/net-e.de\/en\/#website"},"datePublished":"2025-07-28T18:38:16+00:00","dateModified":"2025-07-29T07:39:22+00:00","breadcrumb":{"@id":"https:\/\/net-e.de\/penetrationstesting\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/net-e.de\/penetrationstesting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/net-e.de\/penetrationstesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/net-e.de\/"},{"@type":"ListItem","position":2,"name":"penetrationstesting"}]},{"@type":"WebSite","@id":"https:\/\/net-e.de\/en\/#website","url":"https:\/\/net-e.de\/en\/","name":"net.e","description":"net.e - unabh\u00e4ngige IT Beratung aus Aurich","publisher":{"@id":"https:\/\/net-e.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/net-e.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/net-e.de\/en\/#organization","name":"net.e - Network Experts GmbH","url":"https:\/\/net-e.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","contentUrl":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","width":4744,"height":2680,"caption":"net.e - Network Experts GmbH"},"image":{"@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/pages\/1934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":12,"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/pages\/1934\/revisions"}],"predecessor-version":[{"id":2051,"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/pages\/1934\/revisions\/2051"}],"wp:attachment":[{"href":"https:\/\/net-e.de\/de\/wp-json\/wp\/v2\/media?parent=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}