{"id":25559,"date":"2021-05-13T12:45:35","date_gmt":"2021-05-13T10:45:35","guid":{"rendered":"https:\/\/www.tecsens.com\/5-essential-tools-for-pentesting\/"},"modified":"2021-07-12T14:41:46","modified_gmt":"2021-07-12T12:41:46","slug":"5-essential-tools-for-pentesting","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/","title":{"rendered":"5 essential tools for pentesting:"},"content":{"rendered":"\n<p>As we have seen in previous posts, pentesting is one of the most effective cybersecurity auditing methods. This method is capable of uncovering potential vulnerabilities both internally and externally within an organization. <strong>All tests performed through this methodology have a series of phases and techniques that target servers, switches, routers, IPS\/IDS, firewall, equipment and IoT devices located in different segments of an organization&#8217;s network.<\/strong> <strong>Every penetration test involves the use of techniques to build the network or service map, which will then be used in all other phases of the audit. The 5 essential tools for pentesting and used to have the complete network map of the organization are the following:<\/strong><\/p>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Essential tools for internal network penetration testing:<\/strong><\/h2>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"https:\/\/nmap.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nmap<\/a>\u2013<\/strong> A fundamental tool for mapping machines and building a network map. With this tool it is possible to know the number of machines in each of the subnets and to relate IP addresses with MAC addresses and machine names.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nmap-logo-256x256-2-1024x514.jpg\" alt=\"Nmap\" class=\"wp-image-25493\" width=\"195\" height=\"98\"\/><\/figure><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark<\/a>\u2013 After<\/strong> nmap this tool allows you to view communications that are made over the network, obtaining information about source and destination communications. In addition to displaying ARP, DNS, SNMP, CDP, etc. requests.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark.png\" alt=\"Wireshark\" class=\"wp-image-25499\" width=\"167\" height=\"167\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark.png 400w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-300x300.png 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-150x150.png 150w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-24x24.png 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-36x36.png 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/wireshark-48x48.png 48w\" sizes=\"(max-width: 167px) 100vw, 167px\" \/><\/figure><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Traceroute:<\/strong> used to find out the number of hops needed to reach each of the machines located in each subnet and therefore to know the metric and be able to determine certain behaviors that the firewall can take.<\/li><\/ul>\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Essential tools for external network penetration testing:<\/strong><\/h2>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Nessus:<\/strong> security assessment tool for existing network services.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nessus-1-1024x277.png\" alt=\"\" class=\"wp-image-25522\" width=\"186\" height=\"49\"\/><\/figure><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Nikto:<\/strong> fundamental tool for mapping all the Web resources hanging from the server.<\/li><\/ul>\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/nikto.jpg\" alt=\"Nikto\" class=\"wp-image-25508\" width=\"237\" height=\"108\"\/><\/figure><\/div>\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Thanks to this type of tools that automate security tests and manual exploitation tests, it is possible to detect vulnerabilities and errors in organizations that can free them from future compromises.<\/p>\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Are you going to put the future of your organization at stake?<\/strong><\/h3>\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>More cybersecurity tools<\/strong><\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As we have seen in previous posts, pentesting is one of the most effective cybersecurity auditing methods. This method is capable of uncovering potential vulnerabilities both internally and externally within an organization. All tests performed through this methodology have a series of phases and techniques that target servers, switches, routers, IPS\/IDS, firewall, equipment and IoT [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":25482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[503,504],"tags":[138,392,382],"class_list":["post-25559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-en","category-it-security","tag-consultoria-en","tag-cybersecurity","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 essential tools for pentesting: - Tecsens -<\/title>\n<meta name=\"description\" content=\"The 5 essential tools for pentesting and used to have the complete network map of an organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 essential tools for pentesting: - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"The 5 essential tools for pentesting and used to have the complete network map of an organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-13T10:45:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T12:41:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"5 essential tools for pentesting:\",\"datePublished\":\"2021-05-13T10:45:35+00:00\",\"dateModified\":\"2021-07-12T12:41:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\"},\"wordCount\":307,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"keywords\":[\"Consultancy\",\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Consulting\",\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\",\"name\":\"5 essential tools for pentesting: - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"datePublished\":\"2021-05-13T10:45:35+00:00\",\"dateModified\":\"2021-07-12T12:41:46+00:00\",\"description\":\"The 5 essential tools for pentesting and used to have the complete network map of an organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"5 Essential Pentesting Tools\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 essential tools for pentesting:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 essential tools for pentesting: - Tecsens -","description":"The 5 essential tools for pentesting and used to have the complete network map of an organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/","og_locale":"en_US","og_type":"article","og_title":"5 essential tools for pentesting: - Tecsens -","og_description":"The 5 essential tools for pentesting and used to have the complete network map of an organization.","og_url":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/","og_site_name":"Tecsens","article_published_time":"2021-05-13T10:45:35+00:00","article_modified_time":"2021-07-12T12:41:46+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"5 essential tools for pentesting:","datePublished":"2021-05-13T10:45:35+00:00","dateModified":"2021-07-12T12:41:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/"},"wordCount":307,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","keywords":["Consultancy","Cybersecurity","Security"],"articleSection":["Consulting","IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/","url":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/","name":"5 essential tools for pentesting: - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","datePublished":"2021-05-13T10:45:35+00:00","dateModified":"2021-07-12T12:41:46+00:00","description":"The 5 essential tools for pentesting and used to have the complete network map of an organization.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/05\/TECSENS_5herramientasImprescindiblesPentesting_post_130521-scaled.jpg","width":2560,"height":1442,"caption":"5 Essential Pentesting Tools"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/5-essential-tools-for-pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"5 essential tools for pentesting:"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=25559"}],"version-history":[{"count":10,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25559\/revisions"}],"predecessor-version":[{"id":25853,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25559\/revisions\/25853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/25482"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=25559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=25559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=25559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}