{"id":20,"date":"2024-01-08T11:02:19","date_gmt":"2024-01-08T10:02:19","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=20"},"modified":"2024-11-27T12:22:25","modified_gmt":"2024-11-27T11:22:25","slug":"penetration-tests","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/penetrationstests\/","title":{"rendered":"Penetrationtests"},"content":{"rendered":"<div class=\"wp-block-columns alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-771c1bb2d617ad8a956c7758bd41cab1\"><strong>Penetrationtests<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-932b0bbb45716fa08c6af98821572d54\" style=\"font-style:normal;font-weight:600\">We find the weak points in your systems<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure PenTest<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-pentest.svg\" alt=\"\" class=\"wp-image-169\" style=\"width:520px\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b4aebb85 wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:100px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:70px;margin-bottom:70px\">\n<h2 class=\"wp-block-heading\">What is a penetration test?<\/h2>\n\n\n\n<p>A penetration test is a method of checking the security of an application, device or network that mainly considers technical aspects, although organisational security measures are also included.<\/p>\n\n\n\n<p>As a service provider, we typically receive specific access to the systems to be analysed from you as the client. The type and scope of a penetration test depend on your specific requirements, objectives and the size of the infrastructure to be tested. In consultation, we utilise discovered vulnerabilities to gain access to additional systems. This enables us to assess the actual impact and risk potential of these vulnerabilities.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:70px;margin-bottom:70px\">\n<h2 class=\"wp-block-heading\">The result provides certainty<\/h2>\n\n\n\n<p>As a result of this test, you can be sure whether your hedging and hardening concepts described on paper are also effective in reality or whether you still need to take action.<\/p>\n\n\n\n<p>You will receive a comprehensive report from us which, in addition to a non-technical summary for decision-makers, also contains all the details of the identified vulnerabilities, their impact and exploitability, as well as specific recommendations for reducing the risk and eliminating the vulnerability.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-130a7dc9fb38b5c2b328e65544992471\">A penetration test is worthwhile for your company if<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-c30353fdcb61a8a789b512ce971e737b\">\n<li>you want to know how your IT security is really doing. Trust is good, control is better. <\/li>\n\n\n\n<li>you want to protect your assets and data.<\/li>\n\n\n\n<li>you want to introduce new hardware or software products.<\/li>\n\n\n\n<li>you want to be a trustworthy partner for your customers and suppliers.<\/li>\n\n\n\n<li>you want to prevent cyberattacks.<\/li>\n\n\n\n<li>They must comply with legal and industry-specific requirements and regulations. <\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start PenTest now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide main-client-slider-section-container has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-3987cae6 wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:15px\">\n<div class=\"wp-block-group is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-02273566 wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h2 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Penetration test classification<\/h2>\n\n\n\n<p>We differentiate between penetration tests in the following classifications:<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group lk-cients is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:60px;margin-bottom:60px\">\n<div class=\"wp-block-group client-slider wp-container-content-958eb9dc is-content-justification-center is-layout-flex wp-container-core-group-is-layout-b02886af wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group swiper-wrapper wp-container-content-759e20a8 is-nowrap is-layout-flex wp-container-core-group-is-layout-415537ea wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-b35b1f420e456e919c94c0ace224aa74\">Information basis<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-af4d67e96dacd1074be630e897581073 wp-container-content-577e1c61\"><strong>Realisation<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-1b11e8adcccda3a76f5e5e24728f8769\">\n<li>without prior knowledge (black box)<\/li>\n\n\n\n<li>with partial prior knowledge (grey box)<\/li>\n\n\n\n<li>with extensive prior knowledge (white box)<\/li>\n<\/ol>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-442f2dfa718eb91e4aff95a638cadf02\">Scope<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-a463a52d6d922ae0d5b36d1e81c82e27 wp-container-content-577e1c61\"><strong>If the penetration test is the test<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-b6f299a2f1393d2285cfb3b40581358b\">\n<li>an application<\/li>\n\n\n\n<li>of a network<\/li>\n\n\n\n<li>physical access<\/li>\n<\/ol>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-14ddf4144cc9c372d5e95ff4e8287db8\">Aggressiveness<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-d286396bc63d9abf4093141350af1e4b wp-container-content-577e1c61\"><strong>Should the penetration test rather<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-7ae21c61b1c387443e286afb32b9c61f\">\n<li>Aggressive (thus possibly more time-saving)<\/li>\n\n\n\n<li>cautious<\/li>\n\n\n\n<li>Passive<\/li>\n\n\n\n<li>or weighing up<\/li>\n<\/ol>\n\n\n\n<p class=\"has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-20144c196df6aa3d328a12b492d891de\"><strong>be carried out?<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-1f42656dadd15a66a8838234d6489c58\">Scope<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-56daa91fd0780e98ac0ecafe098717bd wp-container-content-577e1c61\">Should the penetration test\u00a0<strong>complete<\/strong>by factors such as budget\u00a0<strong>limited<\/strong>\u00a0or focus on specific weak points\u00a0<strong>focus<\/strong>?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-aaf1631e602123d40d6c3d24e3be4c4d\">Procedure<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-ec8126a3b21b8ee98c28f70fd0baae71 wp-container-content-577e1c61\">Should the penetration test be carried out obviously (extensive log entries are not a problem here, the defence lawyers are in the loop) or covertly?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group swiper-slide has-custom-wei-darkmode-ingnore-background-color has-background wp-container-content-9cfa9a5a is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-cbea8b96 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:40px;padding-right:40px;padding-bottom:40px;padding-left:40px\">\n<h5 class=\"wp-block-heading lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-956587a07e9f269809da62be59810a54\">Starting point<\/h5>\n\n\n\n<p class=\"lk-quote-refer has-custom-blau-darkmode-ignore-color has-text-color has-link-color wp-elements-c0302d7f62518c349fcce5b4b2903760 wp-container-content-577e1c61\">Should the test be carried out from outside, from the DMZ or from inside? Is a separate test network provided?<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"swiper-pagination\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-9c6bc5d0 wp-block-group-is-layout-flex\" style=\"margin-top:40px;margin-bottom:40px;padding-right:20px;padding-left:0px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-56944019 wp-block-group-is-layout-flex\" style=\"border-style:none;border-width:0px;border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-info.svg\" alt=\"\" class=\"wp-image-403\" style=\"width:28px;height:auto\"\/><\/figure>\n\n\n\n<p class=\"has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-b86d05dde366228793bfc4e1716663e4\" style=\"font-size:15px\">The classifications described here support the targeted preparation of an offer and the planned implementation of the penetration test so that you can place your next order in a targeted manner.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-content-justification-center is-layout-flex wp-container-core-group-is-layout-18151a08 wp-block-group-is-layout-flex\" style=\"margin-top:150px;margin-bottom:150px;padding-right:15px;padding-left:15px\">\n<h2 class=\"wp-block-heading has-text-align-center wp-container-content-6511ad4a\">Our PenTest specialisations<\/h2>\n\n\n\n<div style=\"margin-top:0px;margin-bottom:0px;height:100px;width:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-ae35ab75\"><\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-ot-iot-embedded.svg\" alt=\"\" class=\"wp-image-459\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-272e7dabd1b72f9ccc7e29e4ca63b559\">OT, IoT and Embedded PenTest<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-e812f1e4abb459756ad4214b19dde685\" style=\"font-style:normal;font-weight:600\">Secure your production!<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-44a7d42af24bbf79865c2f90b94bcf65\">OT and IoT devices and their applications require special hardening in order not to pose a risk. The supply of updates is often patchy - the devices must not pose a security risk even after a long time without updates.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/ot-iot-pentest\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-kubernetes.svg\" alt=\"\" class=\"wp-image-460\" style=\"width:275px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-3f5f51dc00fed65bdc72fdd16fd01ee4\">Kubernetes PenTest<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-ba51171856f0ccbf89c9d902275dc50f\" style=\"font-style:normal;font-weight:600\">From containers to clusters: holistic security<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-46a048308a460bde723f8605f000348d\">Complex container networks and clusters often contain business-critical applications. With a particular focus on the assignment of rights, secure communication and fail-safety, we find the deficits and provide support in eliminating them.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/kubernetes-pentest\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-active-directory.svg\" alt=\"\" class=\"wp-image-467\" style=\"width:372px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-a14ba6dfd3a8f56c0c017916bfb88d96\">Active Directory PenTest<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-dc8a6b362de0df33b20491b82bec1d12\" style=\"font-style:normal;font-weight:600\">Protect the centrepiece of your infrastructure<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-6207588c9a507364cbd3323ccad1fb6f\">The Active Directory is one of the main targets of an attacker. Taking over accounts with extensive authorisations gives attackers access to critical core components. We find the weak points in your Active Directory administration and help you to harden your infrastructure!<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/active-directory-pentest\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-netzwerk.svg\" alt=\"\" class=\"wp-image-463\" style=\"width:404px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-62148c7ff034394007716cc9a6db61d4\">Network penetration test<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-41e6746a99843acae186e329d9784946\" style=\"font-style:normal;font-weight:600\">Once in, all gone: How easy is it for hackers on the network?<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-2f95a34fff6098d104fae8f34c6aaaf6\">Secure network transitions and reliable segmentation secure particularly sensitive areas in your company. We find out whether attackers have an easy time in your network.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/network-penetration-test\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-web-apps.svg\" alt=\"\" class=\"wp-image-465\" style=\"width:327px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-cce27655c781204247c490246b8f3934\">Web application PenTest<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-258b91bc0c97356142b7be9292e9ebe8\" style=\"font-style:normal;font-weight:600\">One application, many possibilities - even for attackers<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-3ccdb4b58ad3b40f33619a19f882e697\">Web applications, SaaS products and websites are often a lucrative target for attackers not only because of their public accessibility, but also because of the extensive data that the applications access. They therefore require special protection.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/web-app-penetration-test\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-api.svg\" alt=\"\" class=\"wp-image-466\" style=\"width:444px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-44c0b2b7fc2e1721228af17b2b17e23a\">API penetration test<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-51bb51bcf116b198f48743f213e8ead0\" style=\"font-style:normal;font-weight:600\">Are your interfaces secure?<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-d55be95a98f198eb491833c7a1ebb503\">Wherever interfaces communicate, it becomes interesting for attackers. We identify the starting points for attackers and offer concrete measures to remedy the situation.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/api-pentest\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-cloud-IaaS.svg\" alt=\"\" class=\"wp-image-462\" style=\"width:341px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-20cd0f7d8fb84cb84eb65074ac03d4dd\">Cloud &amp; IaaS PenTest<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-e314c361e1c4670e47d0e1227d2df4ce\" style=\"font-style:normal;font-weight:600\">Future-proof infrastructures require future-proof security<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-b7329ef6cf5847e61cd0687ea8ab4a7d\">The move to the cloud and flexible infrastructures-as-code harbour great opportunities, but also often neglected risks. The cloud is not secure per se, only the attack vectors are different. We find the weak points.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/cloud-iaas-pentest\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container has-contrast-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-774ab8ab wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:40px;margin-bottom:40px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\">\n<div class=\"wp-block-group service-container-img wp-container-content-3b4e4270 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized service-container-img\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-cyber-security-assessment.svg\" alt=\"\" class=\"wp-image-468\" style=\"width:297px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group service-container-content wp-container-content-d0f1e62e is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-c85c1f54 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading fade-up has-base-color has-text-color has-link-color wp-elements-0d6136afc6c16a3470833360755be7d4\">Cyber Security Assessment<\/h3>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-4ca504bb0b65fc80f20390d7a1362253\" style=\"font-style:normal;font-weight:600\">Gain a target-oriented overview of the status quo<\/p>\n\n\n\n<p class=\"fade-up has-base-color has-text-color has-link-color wp-elements-cde49c17c7b2e999a6c08ed0305284de\">Whether you want to gain an initial overview of the status quo of your company's cyber security, minimise the risk posed by a supplier or evaluate a company as part of due diligence, a cyber security assessment provides concrete proof of the current status.<\/p>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/service\/cyber-security-assessment-csa\/\">learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1323\" data-uid=\"69de25462531a\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1323\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1323\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69de25462531a\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><h4 class=\"has-base-color\">Order penetration tests now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69de25462531a-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69de25462531a-label\" class=\"forminator-label\">What type of penetration test should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69de25462531a-label\" for=\"forminator-field-checkbox-1-1-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Web application (full stack)\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Web\" id=\"forminator-field-checkbox-1-1-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-1-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Web application (full stack)<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69de25462531a-label\" for=\"forminator-field-checkbox-1-2-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"API\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"api\" id=\"forminator-field-checkbox-1-2-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-2-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">API<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69de25462531a-label\" for=\"forminator-field-checkbox-1-3-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Geraet\" id=\"forminator-field-checkbox-1-3-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-3-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT device<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69de25462531a-label\" for=\"forminator-field-checkbox-1-4-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Netz\" id=\"forminator-field-checkbox-1-4-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-4-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT network<\/span><\/label><label id=\"forminator-field-checkbox-1-5-69de25462531a-label\" for=\"forminator-field-checkbox-1-5-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Corporate network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Unternehmensnetz\" id=\"forminator-field-checkbox-1-5-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-5-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Corporate network<\/span><\/label><label id=\"forminator-field-checkbox-1-6-69de25462531a-label\" for=\"forminator-field-checkbox-1-6-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Kubernetes\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Kubernetes\" id=\"forminator-field-checkbox-1-6-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-6-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Kubernetes<\/span><\/label><label id=\"forminator-field-checkbox-1-7-69de25462531a-label\" for=\"forminator-field-checkbox-1-7-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"IoT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IoT\" id=\"forminator-field-checkbox-1-7-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-7-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">IoT device<\/span><\/label><label id=\"forminator-field-checkbox-1-8-69de25462531a-label\" for=\"forminator-field-checkbox-1-8-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"ActiveDirectory\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"AD\" id=\"forminator-field-checkbox-1-8-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-8-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">ActiveDirectory<\/span><\/label><label id=\"forminator-field-checkbox-1-9-69de25462531a-label\" for=\"forminator-field-checkbox-1-9-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Cloud application and infrastructure\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Cloud\" id=\"forminator-field-checkbox-1-9-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-9-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Cloud application and infrastructure<\/span><\/label><label id=\"forminator-field-checkbox-1-10-69de25462531a-label\" for=\"forminator-field-checkbox-1-10-69de25462531a\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Infrastructure-as-Code\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IaC\" id=\"forminator-field-checkbox-1-10-69de25462531a\" aria-labelledby=\"forminator-field-checkbox-1-10-69de25462531a-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Infrastructure-as-Code<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-1_69de25462531a\" id=\"forminator-form-1323__field--select-1_69de25462531a-label\" class=\"forminator-label\">Has a penetration test already been carried out?<\/label><select  id=\"forminator-form-1323__field--select-1_69de25462531a\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-1_69de25462531a-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"page-break-2\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-2\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-2_69de25462531a\" id=\"forminator-form-1323__field--select-2_69de25462531a-label\" class=\"forminator-label\">Which approach should be used for the penetration test?<\/label><select  id=\"forminator-form-1323__field--select-2_69de25462531a\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-2\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-2_69de25462531a-label\" aria-describedby=\"forminator-form-1323__field--select-2_69de25462531a-description\"><option value=\"WhiteBox\"  data-calculation=\"0\">White box - a lot of information is available to the testers (e.g. access to log information, source code, different user types)<\/option><option value=\"GrayBox\"  data-calculation=\"0\">Gray Box - some but not all information is available to the testers<\/option><option value=\"BlackBox\"  data-calculation=\"0\">Black box - no information is available to the testers.<\/option><\/select><span id=\"forminator-form-1323__field--select-2_69de25462531a-description\" class=\"forminator-description\">We recommend the white box approach, as it is the most efficient in terms of implementation.<\/span><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-3\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-3-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"3\"\n\t\t\t\tdata-label=\"Page  3\"\n\t\t\t\tdata-actual-label=\"Page 4\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69de25462531a\" id=\"forminator-field-name-1_69de25462531a-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69de25462531a\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69de25462531a\" id=\"forminator-field-email-1_69de25462531a-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69de25462531a\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69de25462531a\" id=\"forminator-field-phone-1_69de25462531a-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69de25462531a\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69de25462531a\" id=\"forminator-field-textarea-1_69de25462531a-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69de25462531a\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69de25462531a\" id=\"forminator-field-consent-1_69de25462531a-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69de25462531a__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69de25462531a\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69de25462531a-label\" aria-describedby=\"forminator-field-consent-1_69de25462531a__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69de25462531a__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"0ffa949968\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/20\" \/><input type=\"hidden\" name=\"form_id\" value=\"1323\"><input type=\"hidden\" name=\"page_id\" value=\"20\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/penetrationstests\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1323.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Penetrationstests Wir finden die Schwachstellen in Ihren Systemen Was ist ein Penetrationstest? Ein Penetrationstest ist eine Methode zur \u00dcberpr\u00fcfung der Sicherheit einer Anwendung, eines Ger\u00e4tes oder eines Netzwerks, bei der haupts\u00e4chlich technische Aspekte ber\u00fccksichtigt werden, obwohl auch organisatorische Sicherheitsma\u00dfnahmen einbezogen werden. Typischerweise erhalten wir als Dienstleister von Ihnen als Auftraggeber spezifische Zugriffsm\u00f6glichkeiten auf die zu [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":169,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-20","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":3828,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/20\/revisions\/3828"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/169"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}