{"id":1934,"date":"2025-07-28T20:38:16","date_gmt":"2025-07-28T18:38:16","guid":{"rendered":"https:\/\/net-e.de\/?page_id=1934"},"modified":"2025-07-29T09:39:22","modified_gmt":"2025-07-29T07:39:22","slug":"penetrationstesting","status":"publish","type":"page","link":"https:\/\/net-e.de\/en\/penetrationstesting\/","title":{"rendered":"penetrationstesting"},"content":{"rendered":"<style type=\"text\/css\">\n\t#hero-small-block_ad839b980b6e42470cc05321db75681c {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Small Hero******************* -->\n<div id=\"hero-small-block_ad839b980b6e42470cc05321db75681c\" class=\"block-hero-small alignfull\">\n\n\t\t\t<div class=\"jumbotron jumbotron-small d-flex align-items-center text-center rounded-0 px-0\" style=\"background-image: url('https:\/\/net-e.de\/wp-content\/uploads\/2021\/12\/img_head-start.svg');\">\n\n\t\t\t<div class=\"container-fluid overlay\">\n\t\t\t\t<div class=\"row h-100\">\n\t\t\t\t\t<div class=\"col-12 overlay-col\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"container container-mt text-container\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t<div class=\"font-small-hero-responsive regular text-white text-left w-75\">\n\t\t\t\t\t\t\t<b style=\"color:#cc5e24\">Penetration tests \u2013 putting your IT to the test<\/b> \t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_9248173991ecfbdbd2cd1ea9a0723cdd {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_9248173991ecfbdbd2cd1ea9a0723cdd\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"330\" data-end=\"385\"><span style=\"color: #cc5e24\"><strong data-start=\"334\" data-end=\"385\">Identify security vulnerabilities before others do<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<p data-start=\"387\" data-end=\"695\">In a digital world where cyberattacks have become an everyday threat, IT security is not an option but a necessity. With a <strong data-start=\"534\" data-end=\"564\">Penetrationstest (Pentest)<\/strong> We test your systems specifically for vulnerabilities\u2014under real conditions and with the expertise of experienced security experts.<\/p>\n<p data-start=\"697\" data-end=\"869\">The aim is to identify vulnerabilities at an early stage, assess risks, and provide specific recommendations for action to ensure security.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_A_hyper-realistic_digital_illustration_of_a_compu_d5c31e3c-9f45-4133-be1c-42fa0a020fa7_0-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_a372b7c1bb0cb10e12420fb248a68472 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_a372b7c1bb0cb10e12420fb248a68472\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg 2560w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-300x200.jpg 300w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1024x683.jpg 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-768x512.jpg 768w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1536x1024.jpg 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-2048x1365.jpg 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"876\" data-end=\"913\"><span style=\"color: #cc5e24\"><strong data-start=\"880\" data-end=\"913\">What is a penetration test?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<p data-start=\"915\" data-end=\"1348\">A penetration test is a controlled attack simulation on your IT systems. Our certified experts analyze your infrastructure from the perspective of a real attacker\u2014either from outside (external tests) or from within the internal network (internal tests). Web applications, mobile apps, Wi-Fi networks, and human vulnerabilities (social engineering) can also be specifically tested.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_b9076bfe8c088a5368e5a1d701281a54 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_b9076bfe8c088a5368e5a1d701281a54\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"1355\" data-end=\"1392\"><span style=\"color: #cc5e24\"><strong data-start=\"1359\" data-end=\"1392\">Our test types at a glance<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<p data-start=\"1394\" data-end=\"1485\">We offer various penetration tests tailored to your environment and requirements:<\/p>\n<ul data-start=\"1487\" data-end=\"2147\">\n<li data-start=\"1487\" data-end=\"1581\">\n<p data-start=\"1489\" data-end=\"1581\"><strong data-start=\"1489\" data-end=\"1509\">External pentest<\/strong>: Testing publicly accessible systems (e.g., websites, VPN, email)<\/p>\n<\/li>\n<li data-start=\"1582\" data-end=\"1679\">\n<p data-start=\"1584\" data-end=\"1679\"><strong data-start=\"1584\" data-end=\"1604\">Internal pentest<\/strong>: Attack simulation with internal access, e.g., via compromised devices<\/p>\n<\/li>\n<li data-start=\"1680\" data-end=\"1767\">\n<p data-start=\"1682\" data-end=\"1767\"><strong data-start=\"1682\" data-end=\"1703\">web application test<\/strong>: Analysis for XSS, SQL injection, authentication errors, etc.<\/p>\n<\/li>\n<li data-start=\"1768\" data-end=\"1840\">\n<p data-start=\"1770\" data-end=\"1840\"><strong data-start=\"1770\" data-end=\"1789\">Mobile App-Test<\/strong>Security testing of your iOS\/Android applications<\/p>\n<\/li>\n<li data-start=\"1841\" data-end=\"1918\">\n<p data-start=\"1843\" data-end=\"1918\"><strong data-start=\"1843\" data-end=\"1863\">Network penetration test<\/strong>Analysis of firewalls, routers, and access controls<\/p>\n<\/li>\n<li data-start=\"1919\" data-end=\"2007\">\n<p data-start=\"1921\" data-end=\"2007\"><strong data-start=\"1921\" data-end=\"1941\">Wireless-Pentest<\/strong>Testing wireless networks for access and configuration errors<\/p>\n<\/li>\n<li data-start=\"2008\" data-end=\"2147\">\n<p data-start=\"2010\" data-end=\"2147\"><strong data-start=\"2010\" data-end=\"2037\">Social Engineering Test<\/strong>Simulation of human attack vectors such as phishing or human intrusion attempts<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1232\" height=\"928\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2.png 1232w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-300x226.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-1024x771.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-768x578.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/u3658113938_ein_hacker_mit_einem_fischbrtchen_-ar_43_-v_6.1_847a1157-9bd1-45bf-9f6c-d9b14635ed80_2-16x12.png 16w\" sizes=\"(max-width: 1232px) 100vw, 1232px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_8375fe1137e22544daa333413160d4c3 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_8375fe1137e22544daa333413160d4c3\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"6424\" height=\"5400\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1.png 6424w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-300x252.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-1024x861.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-768x646.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-1536x1291.png 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-2048x1722.png 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2024\/09\/SIEM-Bild-1-14x12.png 14w\" sizes=\"(max-width: 6424px) 100vw, 6424px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2154\" data-end=\"2221\"><span style=\"color: #cc5e24\"><strong data-start=\"2158\" data-end=\"2221\">Penetration test procedure \u2013 transparent &amp; structured<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"2154\" data-end=\"2221\"><\/h3>\n<ol data-start=\"2223\" data-end=\"2851\">\n<li data-start=\"2223\" data-end=\"2312\">\n<p data-start=\"2226\" data-end=\"2312\"><strong data-start=\"2226\" data-end=\"2254\">Planning &amp; Goal Definition<\/strong><br data-start=\"2254\" data-end=\"2257\" \/>Joint determination of scope, method, and objectives<\/p>\n<\/li>\n<li data-start=\"2314\" data-end=\"2397\">\n<p data-start=\"2317\" data-end=\"2397\"><strong data-start=\"2317\" data-end=\"2344\">information gathering<\/strong><br data-start=\"2344\" data-end=\"2347\" \/>Collecting publicly and internally available data<\/p>\n<\/li>\n<li data-start=\"2399\" data-end=\"2494\">\n<p data-start=\"2402\" data-end=\"2494\"><strong data-start=\"2402\" data-end=\"2427\">vulnerability analysis<\/strong><br data-start=\"2427\" data-end=\"2430\" \/>Combination of automated scans and manual checks<\/p>\n<\/li>\n<li data-start=\"2496\" data-end=\"2589\">\n<p data-start=\"2499\" data-end=\"2589\"><strong data-start=\"2499\" data-end=\"2521\">attack simulation<\/strong><br data-start=\"2521\" data-end=\"2524\" \/>Conducting realistic attacks to assess risks<\/p>\n<\/li>\n<li data-start=\"2591\" data-end=\"2690\">\n<p data-start=\"2594\" data-end=\"2690\"><strong data-start=\"2594\" data-end=\"2620\">Report &amp; Recommendations<\/strong><br data-start=\"2620\" data-end=\"2623\" \/>Detailed documentation including prioritization and action plan<\/p>\n<\/li>\n<li data-start=\"2692\" data-end=\"2851\">\n<p data-start=\"2695\" data-end=\"2851\"><strong data-start=\"2695\" data-end=\"2729\">Presentation &amp; debriefing<\/strong><br data-start=\"2729\" data-end=\"2732\" \/>Clear and understandable evaluation with room for questions and strategy recommendations<\/p>\n<\/li>\n<\/ol>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_555eed977f6cd540abf45e9919222799 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_555eed977f6cd540abf45e9919222799\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2858\" data-end=\"2907\"><span style=\"color: #cc5e24\"><strong data-start=\"2862\" data-end=\"2907\">Test methods \u2013 tailored to your reality<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"2858\" data-end=\"2907\"><\/h3>\n<ul data-start=\"2909\" data-end=\"3161\">\n<li data-start=\"2909\" data-end=\"2977\">\n<p data-start=\"2911\" data-end=\"2977\"><strong data-start=\"2911\" data-end=\"2923\">Blackbox<\/strong>Test without prior knowledge \u2013 like an external attacker<\/p>\n<\/li>\n<li data-start=\"2978\" data-end=\"3048\">\n<p data-start=\"2980\" data-end=\"3048\"><strong data-start=\"2980\" data-end=\"2992\">Whitebox<\/strong>Complete information \u2013 in-depth system analysis<\/p>\n<\/li>\n<li data-start=\"3049\" data-end=\"3161\">\n<p data-start=\"3051\" data-end=\"3161\"><strong data-start=\"3051\" data-end=\"3062\">Greybox<\/strong>Partial information \u2013 targeted test with realistic access<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3163\" data-end=\"3166\" \/>\n<h3 data-start=\"3168\" data-end=\"3219\"><span style=\"color: #cc5e24\"><strong data-start=\"3172\" data-end=\"3219\">More than just a test: Optional services<\/strong><\/span><\/h3>\n<ul data-start=\"3221\" data-end=\"3623\">\n<li data-start=\"3221\" data-end=\"3292\">\n<p data-start=\"3223\" data-end=\"3292\"><strong data-start=\"3223\" data-end=\"3233\">Retest<\/strong>Follow-up check to verify that weaknesses have been remedied<\/p>\n<\/li>\n<li data-start=\"3293\" data-end=\"3366\">\n<p data-start=\"3295\" data-end=\"3366\"><strong data-start=\"3295\" data-end=\"3311\">Blue Teaming<\/strong>: Support in implementing protective measures<\/p>\n<\/li>\n<li data-start=\"3367\" data-end=\"3441\">\n<p data-start=\"3369\" data-end=\"3441\"><strong data-start=\"3369\" data-end=\"3398\">Workshops &amp; Live-Hackings<\/strong>: Raising awareness through practical demonstrations<\/p>\n<\/li>\n<li data-start=\"3442\" data-end=\"3516\">\n<p data-start=\"3444\" data-end=\"3516\"><strong data-start=\"3444\" data-end=\"3469\">Phishing simulations<\/strong>Testing the human safety component<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-scaled.jpg\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-scaled.jpg 2560w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-300x225.jpg 300w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-1024x768.jpg 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-768x576.jpg 768w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-1536x1152.jpg 1536w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-2048x1536.jpg 2048w, https:\/\/net-e.de\/wp-content\/uploads\/2022\/01\/pexels-kevin-ku-577585-16x12.jpg 16w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_7a24bb07146fba08684bbe98495b3d21 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_7a24bb07146fba08684bbe98495b3d21\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-300x300.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-150x150.png 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-768x768.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-12x12.png 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"3914\" data-end=\"3968\"><span style=\"color: #cc5e24\"><strong data-start=\"3918\" data-end=\"3968\">Ready to put your IT security to the test?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"3630\" data-end=\"3661\"><span style=\"color: #cc5e24\"><strong data-start=\"3634\" data-end=\"3661\">Your advantages with net.e<\/strong><\/span><\/h3>\n<ul>\n<li data-start=\"3663\" data-end=\"3907\">Realistic attack simulations<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Implementation by experienced and certified IT security experts<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Individually tailored test concepts<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Comprehensible reports &amp; clear recommendations for action<\/li>\n<li data-start=\"3663\" data-end=\"3907\">Support for ISO 27001, GDPR, BSI, and much more.<\/li>\n<\/ul>\n<p data-start=\"3970\" data-end=\"4122\">Whether on your own initiative or to meet regulatory requirements, a penetration test is the first step toward proactive security.<\/p>\n<p data-start=\"4124\" data-end=\"4256\"><strong data-start=\"4127\" data-end=\"4150\">Contact us<\/strong> \u2013 We will be happy to advise you personally and create a test concept tailored to your systems and goals.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"font-size-12 line-height-18 medium pr-2\">Book appointment<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewbox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_b6804ff65f8ccfb29ae6eb864d366ebb {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_b6804ff65f8ccfb29ae6eb864d366ebb\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p><span style=\"color: #cc5e24\"><strong>Non-binding consultation<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"144\" data-end=\"194\"><span style=\"color: #cc5e24\"><strong data-start=\"148\" data-end=\"194\">Arrange a no-obligation consultation now<\/strong><\/span><\/h3>\n<p data-start=\"196\" data-end=\"482\">Would you like to find out how a penetration test could work in your company? In a non-binding initial consultation, we will clarify your requirements together, highlight possible test options, and answer your questions. <strong data-start=\"434\" data-end=\"481\">transparent, understandable, and on equal footing<\/strong>.<\/p>\n<p data-start=\"484\" data-end=\"595\"><strong data-start=\"487\" data-end=\"533\">Safety begins with the first step.<\/strong><\/p>\n<p data-start=\"484\" data-end=\"595\"><strong data-start=\"539\" data-end=\"595\">Book an appointment now and tackle IT risks head-on.<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0\">\n\n\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t<span class=\"font-size-12 line-height-18 medium pr-2\">Book appointment<\/span>\n\n\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewbox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2.jpeg\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2.jpeg 200w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2-150x150.jpeg 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/03\/1522328520112-2-12x12.jpeg 12w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_43fe9342d45fb203a3ce7b65176a1e5b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_43fe9342d45fb203a3ce7b65176a1e5b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_b6b2e1a5fc15ae010a32daa40757e76e {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_b6b2e1a5fc15ae010a32daa40757e76e\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p> [&#8230;]<\/p>\n<p><a class=\"btn btn-post-read-more mt-5 p-0 d-flex justify-content-center align-items-center\" href=\"https:\/\/net-e.de\/en\/penetrationstesting\/\"><span class=\"ml-auto\">Vollst\u00e4ndiger Bericht<\/span> <span class=\"read-more-inner position-relative ml-auto\"><br \/>\n\t\t\t<svg class=\"position-absolute arrow-down\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"13.707\" height=\"16.707\" viewBox=\"0 0 13.707 16.707\">\n\t\t\t  <g id=\"ic-roundabout-forward\" transform=\"translate(13.351 -10) rotate(90)\">\n\t\t\t    <path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36l6.5,6.4-6.5,6.6\" transform=\"translate(-434.5 -0.36)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t    <line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(10 6.5)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t  <\/g>\n\t\t\t<\/svg><br \/>\n\t\t\t<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/default-skeleton.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1934","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>penetrationstesting | net.e<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/net-e.de\/en\/penetrationstesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"penetrationstesting | net.e\" \/>\n<meta property=\"og:description\" content=\"[...]Vollst\u00e4ndiger Bericht\" \/>\n<meta property=\"og:url\" content=\"https:\/\/net-e.de\/en\/penetrationstesting\/\" \/>\n<meta property=\"og:site_name\" content=\"net.e\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T07:39:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\",\"name\":\"penetrationstesting | net.e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\"},\"datePublished\":\"2025-07-28T18:38:16+00:00\",\"dateModified\":\"2025-07-29T07:39:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/net-e.de\\\/penetrationstesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/net-e.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"penetrationstesting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"name\":\"net.e\",\"description\":\"net.e - unabh\u00e4ngige IT Beratung aus Aurich\",\"publisher\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/net-e.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\",\"name\":\"net.e - Network Experts GmbH\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"width\":4744,\"height\":2680,\"caption\":\"net.e - Network Experts GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"penetrationstesting | net.e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/net-e.de\/en\/penetrationstesting\/","og_locale":"en_US","og_type":"article","og_title":"penetrationstesting | net.e","og_description":"[...]Vollst\u00e4ndiger Bericht","og_url":"https:\/\/net-e.de\/en\/penetrationstesting\/","og_site_name":"net.e","article_modified_time":"2025-07-29T07:39:22+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/net-e.de\/penetrationstesting\/","url":"https:\/\/net-e.de\/penetrationstesting\/","name":"penetrationstesting | net.e","isPartOf":{"@id":"https:\/\/net-e.de\/en\/#website"},"datePublished":"2025-07-28T18:38:16+00:00","dateModified":"2025-07-29T07:39:22+00:00","breadcrumb":{"@id":"https:\/\/net-e.de\/penetrationstesting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/net-e.de\/penetrationstesting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/net-e.de\/penetrationstesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/net-e.de\/"},{"@type":"ListItem","position":2,"name":"penetrationstesting"}]},{"@type":"WebSite","@id":"https:\/\/net-e.de\/en\/#website","url":"https:\/\/net-e.de\/en\/","name":"net.e","description":"net.e - unabh\u00e4ngige IT Beratung aus Aurich","publisher":{"@id":"https:\/\/net-e.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/net-e.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/net-e.de\/en\/#organization","name":"net.e - Network Experts GmbH","url":"https:\/\/net-e.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","contentUrl":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","width":4744,"height":2680,"caption":"net.e - Network Experts GmbH"},"image":{"@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":12,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1934\/revisions"}],"predecessor-version":[{"id":2051,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1934\/revisions\/2051"}],"wp:attachment":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/media?parent=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}