{"version":"1.0","provider_name":"Information Security Blog - 7Security","provider_url":"https:\/\/www.7sec.com\/blog","author_name":"madmin","author_url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/","title":"What is Penetration Testing? - Information Security Blog - 7Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5Ud2pgnfMK\"><a href=\"https:\/\/www.7sec.com\/blog\/what-is-penetration-testing\/\">What is Penetration Testing?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.7sec.com\/blog\/what-is-penetration-testing\/embed\/#?secret=5Ud2pgnfMK\" width=\"600\" height=\"338\" title=\"&#8220;What is Penetration Testing?&#8221; &#8212; Information Security Blog - 7Security\" data-secret=\"5Ud2pgnfMK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.7sec.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"In the world of information security, Penetration Testing is the practice of checking and testing the organization&#8217;s network, servers, and services for possible loopholes and vulnerabilities that an attacker may exploit. Penetration testers are called white hats. They perform hacking in ethical ways, without causing any damage to the computer system, thereby increasing the security &hellip; Continue reading \"\"","thumbnail_url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/06\/pen2.png"}