{"id":19433,"date":"2024-10-12T12:46:13","date_gmt":"2024-10-12T12:46:13","guid":{"rendered":"https:\/\/compliancert.com\/?p=19433"},"modified":"2024-10-12T14:47:48","modified_gmt":"2024-10-12T14:47:48","slug":"bewertung-der-sicherheitslage-durch-manuelle-penetrationstests","status":"publish","type":"post","link":"https:\/\/compliancert.com\/de\/fallstudie\/bewertung-der-sicherheitslage-durch-manuelle-penetrationstests\/","title":{"rendered":"Bewertung der Sicherheitsposition durch manuelle Penetrationstests"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19433\" class=\"elementor elementor-19433\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cc5771 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cc5771\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f678174\" data-id=\"f678174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490ef96 elementor-widget elementor-widget-text-editor\" data-id=\"490ef96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Team identifizierte Schwachstellen und kompromittierte die Anwendung ohne Administratorzugriff oder unter Verwendung bekannter Exploits, wobei der Schwerpunkt auf der Bewertung der Sicherheitslage des Systems und dem Schutz sensibler Daten lag.<!-- notionvc: b957175e-5396-495f-8087-a01a6d9feeb8 --><br \/><!-- notionvc: 998ad04b-52ce-4397-abc7-850afcc6ad1f --><\/p><p><!-- notionvc: 3bedbc35-471d-47e1-b4f8-0941168a2fae --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34063bf elementor-widget elementor-widget-image\" data-id=\"34063bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"644\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&amp;ssl=1\" class=\"attachment-1536x1536 size-1536x1536 wp-image-19545\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=300%2C161&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=1024%2C550&amp;ssl=1 1024w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=768%2C412&amp;ssl=1 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23df62e elementor-widget elementor-widget-text-editor\" data-id=\"23df62e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Kunde<\/strong><\/h3><p>Dieser Fall verdeutlicht den Wert manueller Penetrationstests. Dem Team gelang es, die Anwendungsplattform ohne Administratorzugriff zu kompromittieren, ohne bekannte Exploits zu verwenden oder Deserialisierungs- und RCE-Fehler zu entdecken. Das Hauptziel bestand darin, die Sicherheitslage des Systems zu bewerten und Schwachstellen zu ermitteln, die die Vertraulichkeit und Integrit\u00e4t sensibler Daten gef\u00e4hrden k\u00f6nnten.<\/p><h3><strong>\u00dcberblick \u00fcber das Projekt<\/strong><\/h3><p>Eine webbasierte Anwendung zur sicheren Verwaltung digitaler Unterlagen f\u00fcr eine europ\u00e4ische Organisation f\u00fcr Herstellerverantwortung wurde bewertet. Die Anwendung verarbeitet sensible Dokumente, einschlie\u00dflich Unternehmens- und Finanzinformationen, was robuste Sicherheitsma\u00dfnahmen erfordert.<\/p><h3><strong>Die Herausforderung<\/strong><\/h3><p>Das Penetrationstestteam wurde mit Sicherheitsbewertungen f\u00fcr mobile und Webanwendungen beauftragt. Der Umfang beschr\u00e4nkte sich auf \u00f6ffentlich sichtbare Anlagen wie Websites und Front-Ends f\u00fcr mobile Anwendungen.<\/p><h3><strong>Die Herangehensweise<\/strong><\/h3><p>Das Team wandte eine sorgf\u00e4ltige Methodik an, bei der automatische Scanning-Tools und manuelle Sicherheitsbewertungen kombiniert wurden. Es wurden reale Angriffsszenarien simuliert, um Sicherheitsschwachstellen zu ermitteln und auszunutzen, wobei der Schwerpunkt auf der Eingabevalidierung und der Benutzerinteraktion lag.<\/p><h3><strong>Erste Schritte<\/strong><\/h3><p>Bei den ersten Schritten wurde festgestellt, dass die Webanwendung ihre API mit der mobilen Anwendung teilt. Die Abbildung der API-Funktionalit\u00e4t ergab mehrere Hilfsanfragen, die zus\u00e4tzliche Informationen lieferten. Insbesondere eine Anfrage, die Informationen \u00fcber Sitzungsattribute zur\u00fcckgab, erm\u00f6glichte es dem Team, das Verhalten des Authentifizierungsmechanismus zu modellieren.<\/p><h3><strong>Schwachstellen und Abhilfema\u00dfnahmen<\/strong><\/h3><p><strong>Gespeichertes Cross-Site-Scripting (XSS)<\/strong><\/p><ul><li><strong>Schwachstelle<\/strong>: Eine gespeicherte XSS-Schwachstelle wurde im Kommentarbereich gefunden. B\u00f6sartige Skripte k\u00f6nnten eingeschleust und von Benutzern ausgef\u00fchrt werden, die die Kommentare lesen, was zu Datendiebstahl oder Session-Hijacking f\u00fchren k\u00f6nnte.<\/li><li><strong>Milderung<\/strong>: Es wurden Mechanismen zur Validierung von Eingaben und zur Verschl\u00fcsselung von Ausgaben sowie zur Bereinigung von Benutzereingaben implementiert.<\/li><\/ul><p><strong>HTML-Einschleusung<\/strong><\/p><ul><li><strong>Schwachstelle<\/strong>: Im Benutzerprofil wurde eine HTML-Injection-Schwachstelle gefunden, die es Angreifern erm\u00f6glicht, beliebigen HTML-Code einzuschleusen.<\/li><li><strong>Milderung<\/strong>: Um die Ausf\u00fchrung von b\u00f6sartigem HTML zu verhindern, wurde eine strenge Eingabevalidierung und Ausgabekodierung f\u00fcr benutzergenerierte Inhalte implementiert.<\/li><\/ul><h3><strong>Schlussfolgerung<\/strong><\/h3><p>Der Penetrationstest deckte kritische Schwachstellen auf, die zu unbefugtem Zugriff auf sensible Daten und zur Ausnutzung von Benutzerinteraktionen h\u00e4tten f\u00fchren k\u00f6nnen. Die festgestellten Schwachstellen wurden durch die Implementierung sicherer Kodierungspraktiken und Eingabevalidierungsmechanismen wirksam entsch\u00e4rft. Dieser Fall zeigt, wie wichtig laufende Sicherheitsbewertungen sind, um eine sichere digitale Umgebung f\u00fcr sensible Daten zu gew\u00e4hrleisten.<\/p><p><!-- notionvc: ce5eeeaf-0324-4f3b-9d42-a5b7cddf09d4 --><\/p><h3><!-- notionvc: 2d90692c-71aa-47d6-a202-b9aef6bbb746 --><\/h3><h3><!-- notionvc: 2113c630-c9c9-4a11-80a6-d108721bc41a --><\/h3><h3><!-- notionvc: dac2f0f5-4935-4f26-9902-dd488b85ba76 --><\/h3><p><!-- notionvc: 02ce8e3c-95e2-477b-b802-92434e4d8bf1 --><\/p><p><!-- notionvc: 3bedbc35-471d-47e1-b4f8-0941168a2fae --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Dieser Fall verdeutlicht die Wirksamkeit manueller Penetrationstests.<\/p>","protected":false},"author":1,"featured_media":19545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-19433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-study"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Assessing Security Posture Through Manual Penetration Testing - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/de\/fallstudie\/bewertung-der-sicherheitslage-durch-manuelle-penetrationstests\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"This case highlights the effectiveness of manual penetration tests.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/de\/fallstudie\/bewertung-der-sicherheitslage-durch-manuelle-penetrationstests\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-12T12:46:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-12T14:47:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Compliancert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Compliancert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"},\"author\":{\"name\":\"Compliancert\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/d996eb10a76428d6a357bc598181ccf1\"},\"headline\":\"Assessing Security Posture Through Manual Penetration Testing\",\"datePublished\":\"2024-10-12T12:46:13+00:00\",\"dateModified\":\"2024-10-12T14:47:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"},\"wordCount\":386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"articleSection\":[\"Case Study\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\",\"name\":\"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"datePublished\":\"2024-10-12T12:46:13+00:00\",\"dateModified\":\"2024-10-12T14:47:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"width\":1200,\"height\":644},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Assessing Security Posture Through Manual Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/d996eb10a76428d6a357bc598181ccf1\",\"name\":\"Compliancert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"caption\":\"Compliancert\"},\"url\":\"https:\\\/\\\/compliancert.com\\\/de\\\/author\\\/fsakita\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bewertung der Sicherheitsposition durch manuelle Penetrationstests - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/de\/fallstudie\/bewertung-der-sicherheitslage-durch-manuelle-penetrationstests\/","og_locale":"de_DE","og_type":"article","og_title":"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT","og_description":"This case highlights the effectiveness of manual penetration tests.","og_url":"https:\/\/compliancert.com\/de\/fallstudie\/bewertung-der-sicherheitslage-durch-manuelle-penetrationstests\/","og_site_name":"ComplianceRT","article_published_time":"2024-10-12T12:46:13+00:00","article_modified_time":"2024-10-12T14:47:48+00:00","og_image":[{"width":1200,"height":644,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.jpg","type":"image\/jpeg"}],"author":"Compliancert","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Compliancert","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"},"author":{"name":"Compliancert","@id":"https:\/\/compliancert.com\/#\/schema\/person\/d996eb10a76428d6a357bc598181ccf1"},"headline":"Assessing Security Posture Through Manual Penetration Testing","datePublished":"2024-10-12T12:46:13+00:00","dateModified":"2024-10-12T14:47:48+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"},"wordCount":386,"commentCount":0,"publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"image":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","articleSection":["Case Study"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/","url":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/","name":"Bewertung der Sicherheitsposition durch manuelle Penetrationstests - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","datePublished":"2024-10-12T12:46:13+00:00","dateModified":"2024-10-12T14:47:48+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","width":1200,"height":644},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"Assessing Security Posture Through Manual Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"ComplianceRT","description":"KI-gest\u00fctztes Compliance-Tool &amp; Automatisierungsplattform | DSGVO | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]},{"@type":"Person","@id":"https:\/\/compliancert.com\/#\/schema\/person\/d996eb10a76428d6a357bc598181ccf1","name":"Compliancert","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","caption":"Compliancert"},"url":"https:\/\/compliancert.com\/de\/author\/fsakita\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/19433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/comments?post=19433"}],"version-history":[{"count":9,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/19433\/revisions"}],"predecessor-version":[{"id":19548,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/posts\/19433\/revisions\/19548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media\/19545"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media?parent=19433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/categories?post=19433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/tags?post=19433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}