{"id":19433,"date":"2024-10-12T12:46:13","date_gmt":"2024-10-12T12:46:13","guid":{"rendered":"https:\/\/compliancert.com\/?p=19433"},"modified":"2024-10-12T14:47:48","modified_gmt":"2024-10-12T14:47:48","slug":"evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels","status":"publish","type":"post","link":"https:\/\/compliancert.com\/fr\/etude-de-cas\/evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels\/","title":{"rendered":"\u00c9valuer la posture de s\u00e9curit\u00e9 par des tests de p\u00e9n\u00e9tration manuels"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19433\" class=\"elementor elementor-19433\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cc5771 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cc5771\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f678174\" data-id=\"f678174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490ef96 elementor-widget elementor-widget-text-editor\" data-id=\"490ef96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'\u00e9quipe a identifi\u00e9 les vuln\u00e9rabilit\u00e9s et compromis l'application sans acc\u00e8s administrateur ou en utilisant des exploits connus, en se concentrant sur l'\u00e9valuation de la posture de s\u00e9curit\u00e9 du syst\u00e8me et la protection des donn\u00e9es sensibles.<!-- notionvc: b957175e-5396-495f-8087-a01a6d9feeb8 --><br \/><!-- notionvc: 998ad04b-52ce-4397-abc7-850afcc6ad1f --><\/p><p><!-- notionvc: 3bedbc35-471d-47e1-b4f8-0941168a2fae --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34063bf elementor-widget elementor-widget-image\" data-id=\"34063bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"644\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&amp;ssl=1\" class=\"attachment-1536x1536 size-1536x1536 wp-image-19545\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=300%2C161&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=1024%2C550&amp;ssl=1 1024w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?resize=768%2C412&amp;ssl=1 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23df62e elementor-widget elementor-widget-text-editor\" data-id=\"23df62e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Client<\/strong><\/h3><p>Ce cas illustre la valeur des tests de p\u00e9n\u00e9tration manuels. L'\u00e9quipe a r\u00e9ussi \u00e0 compromettre la plate-forme d'application sans acc\u00e8s administrateur, et sans utiliser d'exploits connus ou d\u00e9couvrir des failles de d\u00e9s\u00e9rialisation et de RCE. L'objectif principal \u00e9tait d'\u00e9valuer la posture de s\u00e9curit\u00e9 du syst\u00e8me et d'identifier les vuln\u00e9rabilit\u00e9s susceptibles de compromettre la confidentialit\u00e9 et l'int\u00e9grit\u00e9 des donn\u00e9es sensibles.<\/p><h3><strong>Aper\u00e7u du projet<\/strong><\/h3><p>Une application web con\u00e7ue pour g\u00e9rer en toute s\u00e9curit\u00e9 les documents num\u00e9riques d'une organisation europ\u00e9enne de responsabilit\u00e9 des producteurs a \u00e9t\u00e9 \u00e9valu\u00e9e. L'application traite des documents sensibles, y compris des informations d'entreprise et des informations financi\u00e8res, ce qui n\u00e9cessite des mesures de s\u00e9curit\u00e9 robustes.<\/p><h3><strong>Le d\u00e9fi<\/strong><\/h3><p>L'\u00e9quipe charg\u00e9e des tests de p\u00e9n\u00e9tration a \u00e9t\u00e9 charg\u00e9e d'\u00e9valuer la s\u00e9curit\u00e9 des applications mobiles et web. Le champ d'application \u00e9tait limit\u00e9 aux actifs visibles par le public, tels que les sites web et les applications mobiles frontales.<\/p><h3><strong>L'approche<\/strong><\/h3><p>L'\u00e9quipe a utilis\u00e9 une m\u00e9thodologie m\u00e9ticuleuse, combinant des outils d'analyse automatis\u00e9s et des \u00e9valuations manuelles de la s\u00e9curit\u00e9. Des sc\u00e9narios d'attaque r\u00e9els ont \u00e9t\u00e9 simul\u00e9s afin d'identifier et d'exploiter les faiblesses de s\u00e9curit\u00e9, en se concentrant particuli\u00e8rement sur la validation des entr\u00e9es et l'interaction avec l'utilisateur.<\/p><h3><strong>Premi\u00e8res \u00e9tapes<\/strong><\/h3><p>Au cours des premi\u00e8res \u00e9tapes, on a d\u00e9couvert que l'application web partageait son API avec l'application mobile. La cartographie de la fonctionnalit\u00e9 de l'API a r\u00e9v\u00e9l\u00e9 plusieurs requ\u00eates d'aide qui ont fourni des informations suppl\u00e9mentaires. En particulier, une requ\u00eate renvoyant des informations sur les attributs de session a permis \u00e0 l'\u00e9quipe de mod\u00e9liser le comportement du m\u00e9canisme d'authentification.<\/p><h3><strong>Vuln\u00e9rabilit\u00e9s et mesures d'att\u00e9nuation<\/strong><\/h3><p><strong>\u00c9critures intersites stock\u00e9es (XSS)<\/strong><\/p><ul><li><strong>Vuln\u00e9rabilit\u00e9<\/strong>: Une vuln\u00e9rabilit\u00e9 XSS stock\u00e9e a \u00e9t\u00e9 d\u00e9couverte dans la section des commentaires. Des scripts malveillants peuvent \u00eatre inject\u00e9s et ex\u00e9cut\u00e9s par les utilisateurs qui consultent les commentaires, ce qui peut entra\u00eener un vol de donn\u00e9es ou un d\u00e9tournement de session.<\/li><li><strong>Att\u00e9nuation<\/strong>: Des m\u00e9canismes de validation des entr\u00e9es et de codage des sorties ont \u00e9t\u00e9 mis en place, ainsi qu'une v\u00e9rification des entr\u00e9es de l'utilisateur.<\/li><\/ul><p><strong>Injection HTML<\/strong><\/p><ul><li><strong>Vuln\u00e9rabilit\u00e9<\/strong>: Une vuln\u00e9rabilit\u00e9 d'injection HTML a \u00e9t\u00e9 trouv\u00e9e dans la section du profil de l'utilisateur, permettant aux attaquants d'injecter du code HTML arbitraire.<\/li><li><strong>Att\u00e9nuation<\/strong>: Une validation d'entr\u00e9e et un encodage de sortie stricts pour le contenu g\u00e9n\u00e9r\u00e9 par l'utilisateur ont \u00e9t\u00e9 mis en \u0153uvre pour emp\u00eacher l'ex\u00e9cution de HTML malveillant.<\/li><\/ul><h3><strong>Conclusion<\/strong><\/h3><p>Le test de p\u00e9n\u00e9tration a r\u00e9v\u00e9l\u00e9 des vuln\u00e9rabilit\u00e9s critiques qui auraient pu conduire \u00e0 un acc\u00e8s non autoris\u00e9 \u00e0 des donn\u00e9es sensibles et \u00e0 l'exploitation des interactions des utilisateurs. Les probl\u00e8mes identifi\u00e9s ont \u00e9t\u00e9 efficacement att\u00e9nu\u00e9s par la mise en \u0153uvre de pratiques de codage s\u00e9curis\u00e9es et de m\u00e9canismes de validation des entr\u00e9es. Ce cas souligne l'importance des \u00e9valuations continues de la s\u00e9curit\u00e9 pour maintenir un environnement num\u00e9rique s\u00fbr pour les donn\u00e9es sensibles.<\/p><p><!-- notionvc: ce5eeeaf-0324-4f3b-9d42-a5b7cddf09d4 --><\/p><h3><!-- notionvc: 2d90692c-71aa-47d6-a202-b9aef6bbb746 --><\/h3><h3><!-- notionvc: 2113c630-c9c9-4a11-80a6-d108721bc41a --><\/h3><h3><!-- notionvc: dac2f0f5-4935-4f26-9902-dd488b85ba76 --><\/h3><p><!-- notionvc: 02ce8e3c-95e2-477b-b802-92434e4d8bf1 --><\/p><p><!-- notionvc: 3bedbc35-471d-47e1-b4f8-0941168a2fae --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ce cas met en \u00e9vidence l'efficacit\u00e9 des tests de p\u00e9n\u00e9tration manuels.<\/p>","protected":false},"author":1,"featured_media":19545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-19433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-study"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Assessing Security Posture Through Manual Penetration Testing - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/fr\/etude-de-cas\/evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"This case highlights the effectiveness of manual penetration tests.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/fr\/etude-de-cas\/evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-12T12:46:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-12T14:47:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Compliancert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Compliancert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"},\"author\":{\"name\":\"Compliancert\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/d996eb10a76428d6a357bc598181ccf1\"},\"headline\":\"Assessing Security Posture Through Manual Penetration Testing\",\"datePublished\":\"2024-10-12T12:46:13+00:00\",\"dateModified\":\"2024-10-12T14:47:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"},\"wordCount\":386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"articleSection\":[\"Case Study\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\",\"name\":\"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"datePublished\":\"2024-10-12T12:46:13+00:00\",\"dateModified\":\"2024-10-12T14:47:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1\",\"width\":1200,\"height\":644},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/case-study\\\/assessing-security-posture-through-manual-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Assessing Security Posture Through Manual Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/d996eb10a76428d6a357bc598181ccf1\",\"name\":\"Compliancert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g\",\"caption\":\"Compliancert\"},\"url\":\"https:\\\/\\\/compliancert.com\\\/fr\\\/author\\\/fsakita\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00c9valuer la posture de s\u00e9curit\u00e9 par des tests de p\u00e9n\u00e9tration manuels - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/fr\/etude-de-cas\/evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels\/","og_locale":"fr_FR","og_type":"article","og_title":"Assessing Security Posture Through Manual Penetration Testing - ComplianceRT","og_description":"This case highlights the effectiveness of manual penetration tests.","og_url":"https:\/\/compliancert.com\/fr\/etude-de-cas\/evaluer-la-posture-de-securite-par-des-tests-de-penetration-manuels\/","og_site_name":"ComplianceRT","article_published_time":"2024-10-12T12:46:13+00:00","article_modified_time":"2024-10-12T14:47:48+00:00","og_image":[{"width":1200,"height":644,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.jpg","type":"image\/jpeg"}],"author":"Compliancert","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Compliancert","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"},"author":{"name":"Compliancert","@id":"https:\/\/compliancert.com\/#\/schema\/person\/d996eb10a76428d6a357bc598181ccf1"},"headline":"Assessing Security Posture Through Manual Penetration Testing","datePublished":"2024-10-12T12:46:13+00:00","dateModified":"2024-10-12T14:47:48+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"},"wordCount":386,"commentCount":0,"publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"image":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","articleSection":["Case Study"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/","url":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/","name":"\u00c9valuer la posture de s\u00e9curit\u00e9 par des tests de p\u00e9n\u00e9tration manuels - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","datePublished":"2024-10-12T12:46:13+00:00","dateModified":"2024-10-12T14:47:48+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","width":1200,"height":644},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/case-study\/assessing-security-posture-through-manual-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"Assessing Security Posture Through Manual Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"Conformit\u00e9RT","description":"Outil de Conformit\u00e9 et Plateforme d'Automatisation Aliment\u00e9s par l'IA | RGPD | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]},{"@type":"Person","@id":"https:\/\/compliancert.com\/#\/schema\/person\/d996eb10a76428d6a357bc598181ccf1","name":"Compliancert","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c7a7a57e75b70c0c6e0313b25d334405ede03ff0fab5e103a30f9ee6bd40c91?s=96&d=mm&r=g","caption":"Compliancert"},"url":"https:\/\/compliancert.com\/fr\/author\/fsakita\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2024\/10\/RT-CsStdy-ManualPenetrationTesting.webp?fit=1200%2C644&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/19433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/comments?post=19433"}],"version-history":[{"count":9,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/19433\/revisions"}],"predecessor-version":[{"id":19548,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/19433\/revisions\/19548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media\/19545"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media?parent=19433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/categories?post=19433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/tags?post=19433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}