{"id":55319,"date":"2023-06-06T18:11:16","date_gmt":"2023-06-06T16:11:16","guid":{"rendered":"https:\/\/www.revistarambla.com\/?p=55319"},"modified":"2023-06-06T18:15:19","modified_gmt":"2023-06-06T16:15:19","slug":"que-es-el-pentesting","status":"publish","type":"post","link":"https:\/\/www.revistarambla.com\/en\/que-es-el-pentesting\/","title":{"rendered":"\u00bfQu\u00e9 es el pentesting?"},"content":{"rendered":"<p><span data-contrast=\"none\">El pentesting, o prueba de penetraci\u00f3n, es una actividad de seguridad inform\u00e1tica que tiene como objetivo evaluar la seguridad de un sistema o red inform\u00e1tica mediante la simulaci\u00f3n de un ataque. Su meta es identificar y aprovechar las vulnerabilidades existentes en el sistema para poder corregirlas antes de que los atacantes reales las exploten. Dentro de un <\/span><span style=\"text-decoration: underline;\"><a href=\"https:\/\/iddigitalschool.com\/bootcamps\/madrid\/bootcamp-en-ciberseguridad-y-hacking-etico\/\">Bootcamp en ciberseguridad y hacking \u00e9tico<\/a><\/span><span data-contrast=\"none\">, el pentesting y toda la parte del red team debe ocupar una parte esencial.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Estudiar pentesting es importante para alguien que desea ingresar al campo de la ciberseguridad por varias razones:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"none\">Identificaci\u00f3n de vulnerabilidades:<\/span><\/b><span data-contrast=\"none\"> El pentesting te brinda habilidades para identificar y comprender las vulnerabilidades en los sistemas y las redes. Esto es fundamental para comprender c\u00f3mo los atacantes pueden aprovechar esas vulnerabilidades.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"none\">Comprensi\u00f3n del panorama de amenazas: <\/span><\/b><span data-contrast=\"none\">A trav\u00e9s del pentesting, adquieres conocimientos sobre las t\u00e9cnicas, herramientas y metodolog\u00edas utilizadas por los atacantes.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"none\">Aprendizaje pr\u00e1ctico:<\/span><\/b><span data-contrast=\"none\"> El pentesting es una disciplina pr\u00e1ctica que implica realizar pruebas reales en sistemas y redes. Esto te brinda una experiencia valiosa y pr\u00e1ctica en la identificaci\u00f3n de vulnerabilidades, la explotaci\u00f3n de sistemas y la adquisici\u00f3n de acceso no autorizado.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"none\">Desarrollo de habilidades defensivas:<\/span><\/b><span data-contrast=\"none\"> Al aprender a pensar como un atacante, puedes desarrollar una mentalidad defensiva m\u00e1s efectiva. Comprender c\u00f3mo funcionan los ataques te permite implementar medidas de seguridad m\u00e1s s\u00f3lidas.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"none\">Cumplimiento normativo:<\/span><\/b><span data-contrast=\"none\"> En muchos sectores y organizaciones, es obligatorio llevar a cabo pruebas de penetraci\u00f3n regulares como parte de los requisitos de cumplimiento normativo.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">El estudio del pentesting es esencial para aquellos interesados en la ciberseguridad, ya que proporciona habilidades pr\u00e1cticas, conocimiento profundo sobre amenazas y vulnerabilidades, y la capacidad de desarrollar estrategias defensivas efectivas, antes de elegir una formaci\u00f3n, puedes revisar las competencias que deben aprender los especialistas en ciberseguridad y todo lo que se puede conseguir con un <\/span><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.universia.net\/es\/actualidad\/orientacion-academica\/bootcamp-en-ciberseguridad-que-es-y-por-que-formarse-en-ello-.html\">Bootcamp en hacking \u00e9tico<\/a><\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">\u00bfCu\u00e1l es el proceso de un pentester?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Un pentester, tambi\u00e9n conocido como \u00abhacker \u00e9tico\u00bb o \u00abanalista de seguridad\u00bb, utiliza t\u00e9cnicas y herramientas similares a las que emplear\u00edan los hackers maliciosos, pero siempre con el consentimiento y conocimiento del propietario del sistema objetivo.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">El proceso de pentesting generalmente sigue los siguientes pasos:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"none\"><strong>Recopilaci\u00f3n de informaci\u00f3n<\/strong>: Se obtiene informaci\u00f3n sobre el objetivo a analizar, como direcciones IP, nombres de dominio, infraestructura de red, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong>An\u00e1lisis de vulnerabilidades<\/strong>: Se realiza un an\u00e1lisis de las vulnerabilidades conocidas y potenciales del sistema objetivo utilizando herramientas autom\u00e1ticas o explorando manualmente.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong>Explotaci\u00f3n<\/strong>: Se intenta explotar las vulnerabilidades encontradas para obtener acceso no autorizado al sistema o a la red.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong>Obtenci\u00f3n de acceso<\/strong>: Si se logra explotar con \u00e9xito una vulnerabilidad, el pentester intenta obtener acceso a los sistemas o datos sensibles para evaluar el alcance del ataque.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong>Informe y recomendaciones<\/strong>: Se documentan todas las actividades realizadas durante el pentesting y se proporcionan recomendaciones para mitigar las vulnerabilidades y fortalecer la seguridad del sistema.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">Es importante destacar que el pentesting debe llevarse a cabo de manera \u00e9tica y dentro de los l\u00edmites acordados con el propietario del sistema. El objetivo principal es ayudar a mejorar la seguridad y proteger los activos digitales, en lugar de causar da\u00f1o o interrupciones.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Recuerda que, si quieres formarte como profesional de la ciberseguridad, puedes elegir diferentes opciones que se adapten a tus necesidades y tu forma de vida, si quieres echarle un vistazo, puedes echar un vistazo a un <\/span><span style=\"text-decoration: underline;\"><a href=\"https:\/\/bootcamps.madrid\/\">Bootcamp en Madrid<\/a><\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>El pentesting, o prueba de penetraci\u00f3n, es una actividad de seguridad inform\u00e1tica que tiene como objetivo evaluar la seguridad de un sistema o red inform\u00e1tica mediante la simulaci\u00f3n de un ataque. Su meta es identificar y aprovechar las vulnerabilidades existentes en el sistema para poder corregirlas antes de que los [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":55320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[350],"tags":[],"class_list":["post-55319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-miscelanea"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es el pentesting? - Revista Rambla<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.revistarambla.com\/en\/que-es-el-pentesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es el pentesting? - Revista Rambla\" \/>\n<meta property=\"og:description\" content=\"El pentesting, o prueba de penetraci\u00f3n, es una actividad de seguridad inform\u00e1tica que tiene como objetivo evaluar la seguridad de un sistema o red inform\u00e1tica mediante la simulaci\u00f3n de un ataque. Su meta es identificar y aprovechar las vulnerabilidades existentes en el sistema para poder corregirlas antes de que los [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.revistarambla.com\/en\/que-es-el-pentesting\/\" \/>\n<meta property=\"og:site_name\" content=\"Revista Rambla\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/revistarambla\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/revistarambla\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T16:11:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T16:15:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"R@mbla\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@revistarambla\" \/>\n<meta name=\"twitter:site\" content=\"@revistarambla\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R@mbla\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/\"},\"author\":{\"name\":\"R@mbla\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#\\\/schema\\\/person\\\/a146a5a2550b94981a75131180e1bd9c\"},\"headline\":\"\u00bfQu\u00e9 es el pentesting?\",\"datePublished\":\"2023-06-06T16:11:16+00:00\",\"dateModified\":\"2023-06-06T16:15:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/pentesting-revista-rambla.jpg\",\"articleSection\":[\"Noticias de la vida\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/\",\"url\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/\",\"name\":\"\u00bfQu\u00e9 es el pentesting? - Revista Rambla\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/pentesting-revista-rambla.jpg\",\"datePublished\":\"2023-06-06T16:11:16+00:00\",\"dateModified\":\"2023-06-06T16:15:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/pentesting-revista-rambla.jpg\",\"contentUrl\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/pentesting-revista-rambla.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/que-es-el-pentesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.revistarambla.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es el pentesting?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#website\",\"url\":\"https:\\\/\\\/www.revistarambla.com\\\/\",\"name\":\"Revista Rambla Barcelona\",\"description\":\"Periodismo independiente\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.revistarambla.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#organization\",\"name\":\"Revista Rambla\",\"url\":\"https:\\\/\\\/www.revistarambla.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/banner_rambla_1900x600_BB.png\",\"contentUrl\":\"https:\\\/\\\/www.revistarambla.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/banner_rambla_1900x600_BB.png\",\"width\":1900,\"height\":600,\"caption\":\"Revista Rambla\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/revistarambla\\\/\",\"https:\\\/\\\/x.com\\\/revistarambla\",\"https:\\\/\\\/www.instagram.com\\\/revista_rambla\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/revista-rambla\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.revistarambla.com\\\/#\\\/schema\\\/person\\\/a146a5a2550b94981a75131180e1bd9c\",\"name\":\"R@mbla\",\"description\":\"Este art\u00edculo ha sido redactado y\\\/o validado por el equipo de redacci\u00f3n de Revista Rambla.\",\"sameAs\":[\"https:\\\/\\\/www.revistarambla.com\\\/\",\"https:\\\/\\\/www.facebook.com\\\/revistarambla\",\"https:\\\/\\\/x.com\\\/revistarambla\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es el pentesting? - Revista Rambla","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.revistarambla.com\/en\/que-es-el-pentesting\/","og_locale":"en_GB","og_type":"article","og_title":"\u00bfQu\u00e9 es el pentesting? - Revista Rambla","og_description":"El pentesting, o prueba de penetraci\u00f3n, es una actividad de seguridad inform\u00e1tica que tiene como objetivo evaluar la seguridad de un sistema o red inform\u00e1tica mediante la simulaci\u00f3n de un ataque. Su meta es identificar y aprovechar las vulnerabilidades existentes en el sistema para poder corregirlas antes de que los [&hellip;]","og_url":"https:\/\/www.revistarambla.com\/en\/que-es-el-pentesting\/","og_site_name":"Revista Rambla","article_publisher":"https:\/\/www.facebook.com\/revistarambla\/","article_author":"https:\/\/www.facebook.com\/revistarambla","article_published_time":"2023-06-06T16:11:16+00:00","article_modified_time":"2023-06-06T16:15:19+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg","type":"image\/jpeg"}],"author":"R@mbla","twitter_card":"summary_large_image","twitter_creator":"@revistarambla","twitter_site":"@revistarambla","twitter_misc":{"Written by":"R@mbla","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#article","isPartOf":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/"},"author":{"name":"R@mbla","@id":"https:\/\/www.revistarambla.com\/#\/schema\/person\/a146a5a2550b94981a75131180e1bd9c"},"headline":"\u00bfQu\u00e9 es el pentesting?","datePublished":"2023-06-06T16:11:16+00:00","dateModified":"2023-06-06T16:15:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.revistarambla.com\/#organization"},"image":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg","articleSection":["Noticias de la vida"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/","url":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/","name":"\u00bfQu\u00e9 es el pentesting? - Revista Rambla","isPartOf":{"@id":"https:\/\/www.revistarambla.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#primaryimage"},"image":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg","datePublished":"2023-06-06T16:11:16+00:00","dateModified":"2023-06-06T16:15:19+00:00","breadcrumb":{"@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.revistarambla.com\/que-es-el-pentesting\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#primaryimage","url":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg","contentUrl":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2023\/06\/pentesting-revista-rambla.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.revistarambla.com\/que-es-el-pentesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.revistarambla.com\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es el pentesting?"}]},{"@type":"WebSite","@id":"https:\/\/www.revistarambla.com\/#website","url":"https:\/\/www.revistarambla.com\/","name":"Revista Rambla Barcelona","description":"Periodismo independiente","publisher":{"@id":"https:\/\/www.revistarambla.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.revistarambla.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.revistarambla.com\/#organization","name":"Revista Rambla","url":"https:\/\/www.revistarambla.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.revistarambla.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2020\/09\/banner_rambla_1900x600_BB.png","contentUrl":"https:\/\/www.revistarambla.com\/wp-content\/uploads\/2020\/09\/banner_rambla_1900x600_BB.png","width":1900,"height":600,"caption":"Revista Rambla"},"image":{"@id":"https:\/\/www.revistarambla.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/revistarambla\/","https:\/\/x.com\/revistarambla","https:\/\/www.instagram.com\/revista_rambla","https:\/\/es.linkedin.com\/company\/revista-rambla"]},{"@type":"Person","@id":"https:\/\/www.revistarambla.com\/#\/schema\/person\/a146a5a2550b94981a75131180e1bd9c","name":"R@mbla","description":"Este art\u00edculo ha sido redactado y\/o validado por el equipo de redacci\u00f3n de Revista Rambla.","sameAs":["https:\/\/www.revistarambla.com\/","https:\/\/www.facebook.com\/revistarambla","https:\/\/x.com\/revistarambla"]}]}},"_links":{"self":[{"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/posts\/55319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/comments?post=55319"}],"version-history":[{"count":4,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/posts\/55319\/revisions"}],"predecessor-version":[{"id":55324,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/posts\/55319\/revisions\/55324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/media\/55320"}],"wp:attachment":[{"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/media?parent=55319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/categories?post=55319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revistarambla.com\/en\/wp-json\/wp\/v2\/tags?post=55319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}