{"id":28,"date":"2024-01-08T11:06:16","date_gmt":"2024-01-08T10:06:16","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=28"},"modified":"2024-11-27T15:09:47","modified_gmt":"2024-11-27T14:09:47","slug":"network-penetration-test","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/netzwerk-penetrationstest\/","title":{"rendered":"Network penetration test"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-e9e8ecfbadc762827a1e8447973dbb9e\"><strong>Network penetration test<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color has-large-font-size wp-elements-a2f0cfa26302206b2be6591276330ed9\" style=\"font-style:normal;font-weight:600\">Once in, all gone: How easy is it for hackers in your network?<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure PenTest<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-netzwerk.svg\" alt=\"Network penetration test\" class=\"wp-image-463\" style=\"width:520px\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-horizontal is-layout-flex wp-container-core-group-is-layout-c21e46d5 wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h2 class=\"wp-block-heading\">Network penetration test<\/h2>\n\n\n\n<p><em>Our core business and passion:<\/em>&nbsp;We check&nbsp;<strong>demand-orientated&nbsp;<\/strong>your systems and applications in the network, document the current status and show you where you can position yourself better.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">What is the difference between a network penetration test and a vulnerability scan?<\/h3>\n\n\n\n<p>An automated vulnerability scan is a process in which a computer programme is used to automatically check a network or system for vulnerabilities.<\/p>\n\n\n\n<p>In contrast, a manual penetration test involves an experienced security expert performing vulnerability tests manually using various techniques to identify potential vulnerabilities in a system or network.<\/p>\n\n\n\n<p>A key difference between the two methods is that an automated vulnerability scan uses a computer programme to check the system, whereas a manual penetration test is carried out by a human expert. This means that a manual penetration test is usually more precise and comprehensive, as it is carried out by an experienced security expert who is able to recognise and assess complex threat scenarios.<\/p>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:70px;margin-bottom:70px\">\n<h2 class=\"wp-block-heading\">Penetration test classification<\/h2>\n\n\n\n<p>There are various parameters that can be agreed before carrying out a penetration test. They all have their pros and cons.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-c5fbdba4 wp-block-group-is-layout-flex\" style=\"margin-top:60px\">\n<div class=\"wp-block-group line-holder wp-container-content-b3829bdc is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"timline-line\"><\/div>\n\n\n\n<div class=\"timline-line-base\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group wp-container-content-68ac353a is-layout-flex wp-container-core-group-is-layout-4255f73a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-af4eb98ac4fe7d99a9a45c878ea87541\">Information basis<\/h6>\n\n\n\n<p>Realisation<\/p>\n\n\n\n<ol style=\"padding-top:10px;padding-bottom:10px\" class=\"wp-block-list\">\n<li>without prior knowledge (black box)<\/li>\n\n\n\n<li>with partial prior knowledge (grey box)<\/li>\n\n\n\n<li>with extensive prior knowledge (white box)<\/li>\n<\/ol>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-68c22d6d0360d4b38c980f1df5125d69\">Scope<\/h6>\n\n\n\n<p>The scope describes the extent of the network penetration test. During the penetration test, we check your technical and organisational security measures, with a clear focus on the technical aspects. The scope defines exclusions and framework parameters that must be adhered to during the test - for example, network areas or components on which a special focus should be placed or which should not be considered during the analysis.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-3e5f02b22fc14544244c137fcc7788ee\">Aggressiveness<\/h6>\n\n\n\n<p>Should the penetration test rather<\/p>\n\n\n\n<ol style=\"padding-top:10px;padding-bottom:10px\" class=\"wp-block-list\">\n<li>Aggressive (thus possibly more time-saving)<\/li>\n\n\n\n<li>cautious<\/li>\n\n\n\n<li>Passive<\/li>\n\n\n\n<li>or weighing up<\/li>\n<\/ol>\n\n\n\n<p>be carried out?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-46e8feb622cefb87a185ab53402036d2\">Scope<\/h6>\n\n\n\n<p>Should the penetration test&nbsp;<strong>complete,&nbsp;<\/strong>by factors such as budget&nbsp;<strong>limited<\/strong>or focus on specific weak points&nbsp;<strong>focus<\/strong>?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-c0c1a8b3ef119b9d2237cf8b84245410\">Procedure<\/h6>\n\n\n\n<p>Should the penetration test be carried out obviously (extensive log entries are not a problem here, the defence lawyers are in the loop) or covertly?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-eb38f5ee14b4cb66af269ad1be5d1121\">Starting point<\/h6>\n\n\n\n<p>Should the test be carried out from outside, from the DMZ or from inside? Is a separate test network provided?<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-aa5f6e7da7221f01236a190d5b86ab7b\">When does a <strong>Network<\/strong> PenTest make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-60a85636a58c3c155766ba40256b041b\">\n<li>You want to gain practical knowledge about the security of your network and its components.<\/li>\n\n\n\n<li>You want to check whether the security solutions you are using, such as firewalls, are effective.<\/li>\n\n\n\n<li>You need concrete recommendations for possible safety measures.<\/li>\n\n\n\n<li>You want to fulfil the latest compliance standards and legal requirements.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start PenTest now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1323\" data-uid=\"69e30df79cad1\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1323\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1323\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69e30df79cad1\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><h4 class=\"has-base-color\">Order a network penetration test now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69e30df79cad1-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69e30df79cad1-label\" class=\"forminator-label\">What type of penetration test should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-1-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Web application (full stack)\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Web\" id=\"forminator-field-checkbox-1-1-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-1-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Web application (full stack)<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-2-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"API\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"api\" id=\"forminator-field-checkbox-1-2-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-2-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">API<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-3-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Geraet\" id=\"forminator-field-checkbox-1-3-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-3-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT device<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-4-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Netz\" id=\"forminator-field-checkbox-1-4-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-4-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT network<\/span><\/label><label id=\"forminator-field-checkbox-1-5-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-5-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Corporate network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Unternehmensnetz\" id=\"forminator-field-checkbox-1-5-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-5-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Corporate network<\/span><\/label><label id=\"forminator-field-checkbox-1-6-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-6-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Kubernetes\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Kubernetes\" id=\"forminator-field-checkbox-1-6-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-6-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Kubernetes<\/span><\/label><label id=\"forminator-field-checkbox-1-7-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-7-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"IoT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IoT\" id=\"forminator-field-checkbox-1-7-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-7-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">IoT device<\/span><\/label><label id=\"forminator-field-checkbox-1-8-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-8-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"ActiveDirectory\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"AD\" id=\"forminator-field-checkbox-1-8-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-8-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">ActiveDirectory<\/span><\/label><label id=\"forminator-field-checkbox-1-9-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-9-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Cloud application and infrastructure\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Cloud\" id=\"forminator-field-checkbox-1-9-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-9-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Cloud application and infrastructure<\/span><\/label><label id=\"forminator-field-checkbox-1-10-69e30df79cad1-label\" for=\"forminator-field-checkbox-1-10-69e30df79cad1\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Infrastructure-as-Code\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IaC\" id=\"forminator-field-checkbox-1-10-69e30df79cad1\" aria-labelledby=\"forminator-field-checkbox-1-10-69e30df79cad1-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Infrastructure-as-Code<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-1_69e30df79cad1\" id=\"forminator-form-1323__field--select-1_69e30df79cad1-label\" class=\"forminator-label\">Has a penetration test already been carried out?<\/label><select  id=\"forminator-form-1323__field--select-1_69e30df79cad1\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-1_69e30df79cad1-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"page-break-2\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-2\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-2_69e30df79cad1\" id=\"forminator-form-1323__field--select-2_69e30df79cad1-label\" class=\"forminator-label\">Which approach should be used for the penetration test?<\/label><select  id=\"forminator-form-1323__field--select-2_69e30df79cad1\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-2\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-2_69e30df79cad1-label\" aria-describedby=\"forminator-form-1323__field--select-2_69e30df79cad1-description\"><option value=\"WhiteBox\"  data-calculation=\"0\">White box - a lot of information is available to the testers (e.g. access to log information, source code, different user types)<\/option><option value=\"GrayBox\"  data-calculation=\"0\">Gray Box - some but not all information is available to the testers<\/option><option value=\"BlackBox\"  data-calculation=\"0\">Black box - no information is available to the testers.<\/option><\/select><span id=\"forminator-form-1323__field--select-2_69e30df79cad1-description\" class=\"forminator-description\">We recommend the white box approach, as it is the most efficient in terms of implementation.<\/span><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-3\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-3-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"3\"\n\t\t\t\tdata-label=\"Page  3\"\n\t\t\t\tdata-actual-label=\"Page 4\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69e30df79cad1\" id=\"forminator-field-name-1_69e30df79cad1-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69e30df79cad1\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69e30df79cad1\" id=\"forminator-field-email-1_69e30df79cad1-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69e30df79cad1\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69e30df79cad1\" id=\"forminator-field-phone-1_69e30df79cad1-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69e30df79cad1\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69e30df79cad1\" id=\"forminator-field-textarea-1_69e30df79cad1-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69e30df79cad1\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69e30df79cad1\" id=\"forminator-field-consent-1_69e30df79cad1-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69e30df79cad1__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69e30df79cad1\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69e30df79cad1-label\" aria-describedby=\"forminator-field-consent-1_69e30df79cad1__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69e30df79cad1__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"36a46a16a8\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/28\" \/><input type=\"hidden\" name=\"form_id\" value=\"1323\"><input type=\"hidden\" name=\"page_id\" value=\"28\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/netzwerk-penetrationstest\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1323.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Netzwerk Penetrationstest Einmal drin, alles hin: Wie leicht haben es Hacker in Ihrem Netzwerk? Netzwerk Penetrationstest Unser Kerngesch\u00e4ft und Leidenschaft:&nbsp;Wir pr\u00fcfen&nbsp;bedarfsorientert&nbsp;Ihre Systeme und Anwendungen im Netzwerk, dokumentieren den Ist-Stand und zeigen Ihnen, wo Sie sich besser aufstellen k\u00f6nnen. Was ist der Unterschied zwischen Netzwerk Penetrationstest und Schwachsstellenscan? Ein automatisierter Schwachstellenscan ist ein Prozess, bei dem [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":463,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-28","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":9,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":3844,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/28\/revisions\/3844"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}