{"id":109,"date":"2017-08-27T20:12:34","date_gmt":"2017-08-27T20:12:34","guid":{"rendered":"http:\/\/www.ebruu.com\/?page_id=109"},"modified":"2019-10-02T08:03:30","modified_gmt":"2019-10-02T08:03:30","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/www.ebruu.com\/index.php\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"<p>Penetration testing\u00a0dives deeper and fully evaluates an organisation\u2019s network, applications, endpoints and internal\/external attempts to infiltrate its security points. By simulating an attack, the Ebruu penetration testing experts will try to circumvent security points (firewalls, intrusion detection systems and other protection systems) and infiltrate a network, just like a real hacker would do. The goal is to ensure all areas of a network are fully \u201cbulletproof\u201d and without any weak gaps.\u00a0Penetration tests determine the feasibility of certain attack vectors and successfully identify high risk vulnerabilities that can be exploited.<\/p>\n<h3 class=\"ng-scope\">The Ebruu Penetration Testing Services include:<\/h3>\n<ul class=\"ng-scope\">\n<li>Internal Penetration Testing<\/li>\n<li>External Infrastructure Penetration Testing<\/li>\n<li>Web Application Penetration Testing<\/li>\n<li>Mobile Application Penetration Testing<\/li>\n<li>Wireless Infrastructure Penetration Testing<\/li>\n<li>SCADA Penetration Testing<\/li>\n<li>Palm System Penetration Testing<\/li>\n<li>Social Engineering Testing<\/li>\n<li>DOS\/DDOS Testing<\/li>\n<\/ul>\n<p class=\"ng-scope\">If you would like to find out how penetration testing service can be beneficial for your company or more information about our service, <a href=\"http:\/\/www.ebruu.com\/index.php\/contact\/\">please contact our security experts<\/a> to get a free quick consultation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration testing\u00a0dives deeper and fully evaluates an organisation\u2019s network, applications, endpoints and internal\/external attempts to infiltrate its security points. By simulating an attack, the Ebruu penetration testing experts will try to circumvent security points (firewalls, intrusion detection systems and other protection systems) and infiltrate a network, just like a real hacker would do. The goal [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-109","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":4,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions"}],"predecessor-version":[{"id":450,"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions\/450"}],"wp:attachment":[{"href":"https:\/\/www.ebruu.com\/index.php\/wp-json\/wp\/v2\/media?parent=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}