{"id":3425,"date":"2022-06-15T18:27:54","date_gmt":"2022-06-15T16:27:54","guid":{"rendered":"https:\/\/security.sauer.ninja\/?p=3425"},"modified":"2026-04-27T15:22:23","modified_gmt":"2026-04-27T13:22:23","slug":"what-is-a-penetration-test","status":"publish","type":"post","link":"https:\/\/security.sauer.ninja\/en\/pentesting\/what-is-a-penetration-test\/","title":{"rendered":"What is a penetration test?"},"content":{"rendered":"\n<p>A penetration test is basically a structured attack on a company&#8217;s IT infrastructure. During this, a penetration tester uses the same tools and techniques that a hacker uses in his attack. However, the objective differs between a malicious hacker and a professional penetration tester.<\/p>\n\n\n\n<p>A hacker usually tries to hack a company in order to gain access to its IT systems and data. To do this, he only needs a single critical vulnerability that can successfully exploited.<\/p>\n\n\n\n<p>However, companies that commission a penetration test do not primarily want to be successfully hacked, they want to know whether this is possible. For this purpose, a penetration tester will try to identify all vulnerabilities, regardless of their criticality. Many vulnerabilities are also attempted to be exploited, but not all. Because some further attacks pose a higher risk for the attacked IT systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A penetration test is basically a structured attack on a company&#8217;s IT infrastructure. During this, a penetration tester uses the same tools and techniques that a hacker uses in his attack. However, the objective differs between a malicious hacker and a professional penetration tester. A hacker usually tries to hack a company in order to &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/security.sauer.ninja\/en\/pentesting\/what-is-a-penetration-test\/\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[220],"tags":[],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-psauer","4":"post-3425","6":"format-standard","7":"category-pentesting"},"_links":{"self":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/posts\/3425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/comments?post=3425"}],"version-history":[{"count":2,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/posts\/3425\/revisions"}],"predecessor-version":[{"id":3427,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/posts\/3425\/revisions\/3427"}],"wp:attachment":[{"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/media?parent=3425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/categories?post=3425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security.sauer.ninja\/en\/wp-json\/wp\/v2\/tags?post=3425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}