{"id":25543,"date":"2021-05-13T12:09:56","date_gmt":"2021-05-13T10:09:56","guid":{"rendered":"https:\/\/www.tecsens.com\/5-unverzichtbare-tools-fuer-pentesting\/"},"modified":"2021-07-12T14:40:58","modified_gmt":"2021-07-12T12:40:58","slug":"5-unverzichtbare-tools-fuer-pentesting","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/","title":{"rendered":"5 unverzichtbare Tools f\u00fcr Pentesting:"},"content":{"rendered":"\n<p>Wie wir in fr\u00fcheren Beitr\u00e4gen gesehen haben, ist das Pentesting eine der effektivsten Methoden zur \u00dcberpr\u00fcfung der Cybersicherheit. Diese Methode ist in der Lage, potenzielle Schwachstellen sowohl innerhalb als auch au\u00dferhalb einer Organisation aufzudecken. <strong>Alle Tests, die mit dieser Methodik durchgef\u00fchrt werden, haben eine Reihe von Phasen und Techniken, die auf Server, Switches, Router, IPS\/IDS, Firewall, Ger\u00e4te und IoT-Ger\u00e4te abzielen, die sich in verschiedenen Segmenten des Netzwerks einer Organisation befinden.<\/strong> <strong>Bei allen Penetrationstests werden Techniken eingesetzt, um die Netzwerk- oder Dienstkarte zu erstellen, die dann in allen anderen Phasen des Audits verwendet wird. Die 5 wesentlichen Tools f\u00fcr das Pentesting, die verwendet werden, um die komplette Netzwerkkarte der Organisation zu haben, sind die folgenden:<\/strong><\/p>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Unverzichtbare Tools f\u00fcr interne Netzwerk-Penetrationstests:<\/strong><\/h2>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"https:\/\/nmap.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nmap:<\/a><\/strong> Ein wichtiges Werkzeug, um Maschinen zu kartieren und eine Netzwerkkarte zu erstellen. Mit diesem Tool k\u00f6nnen Sie die Anzahl der Rechner in den einzelnen Subnetzen ermitteln und IP-Adressen mit MAC-Adressen und Rechnernamen in Beziehung setzen.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nmap-logo-256x256-2-1024x514.jpg\" alt=\"Nmap\" class=\"wp-image-25493\" width=\"195\" height=\"98\"\/><\/figure><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark:<\/a><\/strong> Nach nmap erm\u00f6glicht dieses Tool die Visualisierung der Kommunikation im Netzwerk, indem es Informationen \u00fcber Dienseund Zielkommunikation erh\u00e4lt. Zus\u00e4tzlich zur Anzeige von ARP-, DNS-, SNMP-, CDP-&#8230; usw. Anfragen.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark.png\" alt=\"Wireshark\" class=\"wp-image-25500\" width=\"167\" height=\"167\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark.png 400w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-300x300.png 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-150x150.png 150w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-24x24.png 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-36x36.png 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-48x48.png 48w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/figure><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Traceroute:<\/strong> wird verwendet, um die Anzahl der Hops herauszufinden, die ben\u00f6tigt werden, um jeden der Rechner zu erreichen, die sich in jedem Subnetz befinden, und somit die Metrik zu kennen und um bestimmte Verhaltensweisen zu bestimmen, die die Firewall einnehmen kann.<\/li><\/ul>\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Unverzichtbare Tools f\u00fcr externe Netzwerk-Penetrationstests:<\/strong><\/h2>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Nessus:<\/strong> Sicherheitsbewertungstool f\u00fcr bestehende Netzwerkdienste.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nessus-1-1024x277.png\" alt=\"\" class=\"wp-image-25522\" width=\"186\" height=\"49\"\/><\/figure><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Nikto:<\/strong> grundlegendes Werkzeug zum Abbilden aller Web-Ressourcen, die am Server h\u00e4ngen.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nikto.jpg\" alt=\"Nikto\" class=\"wp-image-25509\" width=\"237\" height=\"108\"\/><\/figure><\/div>\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Dank dieser Art von Tools, die Sicherheitstests automatisieren und manuelle Exploitation-Tests durchf\u00fchren, ist es m\u00f6glich, Schwachstellen und Fehler in Organisationen zu erkennen, die sie vor zuk\u00fcnftigen Kompromittierungen bewahren k\u00f6nnen.<\/p>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Wollen Sie die Zukunft Ihres Unternehmens aufs Spiel setzen?<\/strong><\/h3>\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Mehr Tools f\u00fcr die Cybersicherheit<\/strong><\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wie wir in fr\u00fcheren Beitr\u00e4gen gesehen haben, ist das Pentesting eine der effektivsten Methoden zur \u00dcberpr\u00fcfung der Cybersicherheit. Diese Methode ist in der Lage, potenzielle Schwachstellen sowohl innerhalb als auch au\u00dferhalb einer Organisation aufzudecken. Alle Tests, die mit dieser Methodik durchgef\u00fchrt werden, haben eine Reihe von Phasen und Techniken, die auf Server, Switches, Router, IPS\/IDS, [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":25483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[522,523],"tags":[394,355,383],"class_list":["post-25543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-beratung","category-it-sicherheit","tag-cybersecurity-de","tag-it-beratung","tag-sicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -<\/title>\n<meta name=\"description\" content=\"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-13T10:09:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T12:40:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"5 unverzichtbare Tools f\u00fcr Pentesting:\",\"datePublished\":\"2021-05-13T10:09:56+00:00\",\"dateModified\":\"2021-07-12T12:40:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\"},\"wordCount\":316,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"IT-Beratung\",\"Sicherheit\"],\"articleSection\":[\"Beratung\",\"IT-Sicherheit\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\",\"url\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\",\"name\":\"5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"datePublished\":\"2021-05-13T10:09:56+00:00\",\"dateModified\":\"2021-07-12T12:40:58+00:00\",\"description\":\"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"5 Unverzichtbare Pentesting-Tools\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 unverzichtbare Tools f\u00fcr Pentesting:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -","description":"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/","og_locale":"de_DE","og_type":"article","og_title":"5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -","og_description":"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.","og_url":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/","og_site_name":"Tecsens","article_published_time":"2021-05-13T10:09:56+00:00","article_modified_time":"2021-07-12T12:40:58+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"TECSENS Marketing","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"5 unverzichtbare Tools f\u00fcr Pentesting:","datePublished":"2021-05-13T10:09:56+00:00","dateModified":"2021-07-12T12:40:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/"},"wordCount":316,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","keywords":["Cybersecurity","IT-Beratung","Sicherheit"],"articleSection":["Beratung","IT-Sicherheit"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/","url":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/","name":"5 unverzichtbare Tools f\u00fcr Pentesting: %sep%Tecsens - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","datePublished":"2021-05-13T10:09:56+00:00","dateModified":"2021-07-12T12:40:58+00:00","description":"Die 5 essentiellen Tools f\u00fcr Pentesting, um die komplette Netzwerkkarte einer Organisation zu haben.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","width":2560,"height":1442,"caption":"5 Unverzichtbare Pentesting-Tools"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/de\/5-unverzichtbare-tools-fuer-pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/de\/"},{"@type":"ListItem","position":2,"name":"5 unverzichtbare Tools f\u00fcr Pentesting:"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/25543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/comments?post=25543"}],"version-history":[{"count":10,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/25543\/revisions"}],"predecessor-version":[{"id":25839,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/25543\/revisions\/25839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media\/25483"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media?parent=25543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/categories?post=25543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/tags?post=25543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}