{"id":8135,"date":"2022-06-29T13:52:26","date_gmt":"2022-06-29T10:52:26","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8135"},"modified":"2022-06-29T14:10:21","modified_gmt":"2022-06-29T11:10:21","slug":"pentesting-hakkinda-kacirdigimiz-noktalar","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/pentesting-hakkinda-kacirdigimiz-noktalar\/","title":{"rendered":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar"},"content":{"rendered":"<p><strong>Pentesting Gibi G\u00f6r\u00fcnen Ama Olmayan 6 Ara\u00e7<\/strong><\/p>\n<p>\u201cPentesting\u201d denilen her \u015fey pentest de\u011fildir. Farkl\u0131 g\u00fcndemleri olan farkl\u0131 payda\u015flar i\u00e7in farkl\u0131 metodolojiler kullanan \u00e7ok say\u0131da farkl\u0131 g\u00fcvenlik testi ve arac\u0131 vard\u0131r. Pentest ve ayr\u0131ca g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmesi, uyumluluk denetimi ve di\u011fer bi\u00e7imleri i\u00e7eren g\u00fcvenlik testleri daha da geni\u015ftir. Pentesting t\u00fcrleri ile pentest olarak adland\u0131r\u0131lan ancak temelde farkl\u0131 olan stratejiler aras\u0131ndaki farklar\u0131 inceleyece\u011fiz.<\/p>\n<p><strong>\u0130lk olarak, ne i\u00e7in test yap\u0131yorsunuz?<\/strong><\/p>\n<p>Bir siber tehdit akt\u00f6r\u00fc gibi, ancak g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ke\u015ffetmek amac\u0131yla sahibinden izin alarak bir a\u011fa veya bilgisayar sistemine s\u0131zmaya m\u0131 \u00e7al\u0131\u015f\u0131yorsunuz? O zaman, yapt\u0131\u011f\u0131n\u0131z \u015feyin pentest olma ihtimali vard\u0131r. Bir t\u00fcr g\u00fcvenlik standartlar\u0131 kontrol listesi kullan\u0131yorsan\u0131z ve siber sald\u0131r\u0131lar\u0131 sim\u00fcle etmeden g\u00fcvenlik a\u00e7\u0131klar\u0131 ar\u0131yorsan\u0131z, bu bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmesidir. Kula\u011fa bariz geliyor, ancak baz\u0131 kurulu\u015flar, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmelerini yanl\u0131\u015f bir \u015fekilde pentest olarak adland\u0131rarak satmaya \u00e7al\u0131\u015f\u0131yor. Pentestler, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmelerinden &#8220;daha iyi&#8221; de\u011fildir; bunlar farkl\u0131 t\u00fcrde g\u00fcvenlik testleridir. Her biri farkl\u0131 problemler i\u00e7in en iyi \u00e7\u00f6z\u00fcm olabilir.<\/p>\n<p><strong>Pentesting <\/strong><\/p>\n<p>Pentesting, \u00f6zel olarak e\u011fitilmi\u015f ki\u015filerin siber sald\u0131r\u0131lar\u0131 sim\u00fcle etmesidir. Uygulamalar\u0131, komut dosyalar\u0131n\u0131 kullanabilir ve hatta sosyal m\u00fchendislik ve fiziksel g\u00fcvenlik s\u0131zma testi gibi analog faaliyetler y\u00fcr\u00fctebilirler. G\u00fcc\u00fc ve zay\u0131fl\u0131\u011f\u0131, testi yapan insanlar ve \u00fczerinde \u00e7al\u0131\u015ft\u0131klar\u0131 platformdur. Etkili bir platformda iyi test\u00e7iler olmadan, test al\u0131c\u0131y\u0131 g\u00fcven i\u00e7inde b\u0131rakmayabilir. Geleneksel pentesting, yaln\u0131zca birka\u00e7 ki\u015finin becerilerine dayan\u0131r ve veri de\u011fil, okunabilir bir rapor verir. Synack, m\u00fcmk\u00fcn olan en iyi pentest i\u00e7in en iyi platformda en iyi test kullan\u0131c\u0131lar\u0131n\u0131 toplamak i\u00e7in kuruldu. Bir pentestin \u00e7\u0131kt\u0131s\u0131 \u2013 en az\u0131ndan Synack stili \u2013 bulgulara, iyile\u015ftirme bilgilerine, testle ilgili analitiklere ve daha fazlas\u0131na ger\u00e7ek zamanl\u0131 eri\u015fimdir.<\/p>\n<p>Farkl\u0131 pentesting t\u00fcrleri, bir bilgisayar sisteminin hangi y\u00f6n\u00fcn\u00fcn test edildi\u011fine g\u00f6re kategorize edilebilir. Ana dallar, a\u011f s\u0131zma testi, uygulama s\u0131zma testi, insanlarda zafiyetleri bulan sosyal m\u00fchendislik s\u0131zma testleri ve binalarda, odalarda ve benzerlerinde zafiyetleri bulan fiziksel s\u0131zma testleridir.<\/p>\n<p>Pentesting ayr\u0131ca, test edenlerin eri\u015febildi\u011fi bilgilere g\u00f6re de kategorize edilir. Kara kutu testi, harici bir sald\u0131rgan\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131ndan bir hedef hakk\u0131nda \u00e7ok az bilgiyle veya hi\u00e7 bilgi olmadan yap\u0131l\u0131r. Beyaz kutu testi, hedefin BT departman\u0131ndaki dahili bir sald\u0131rgan\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131yla derinlemesine hedef bilgisi ile yap\u0131l\u0131r. Ve Greybox testi, teknik olmayan bir i\u00e7eriden birinin bak\u0131\u015f a\u00e7\u0131s\u0131yla ortaya \u00e7\u0131kar. Siber tehditlere haz\u0131rlanman\u0131n pentestten farkl\u0131 ba\u015fka yollar\u0131 da vard\u0131r. Baz\u0131lar\u0131n\u0131 ke\u015ffedelim.<\/p>\n<p><strong>G\u00fcvenlik Testi Metodolojileri (Pentesting De\u011fildir)<\/strong><\/p>\n<p>Sald\u0131r\u0131 tekrar\u0131na veya komut dosyas\u0131 olu\u015fturmaya dayal\u0131 \u0130hlal ve Sald\u0131r\u0131 Sim\u00fclasyonu (BAS), g\u00fcvenlik testi teknolojisinde nispeten yeni bir geli\u015fmedir. Belirli a\u00e7\u0131klar\u0131 sim\u00fcle eden komut dosyalar\u0131, bir y\u00f6neticinin belirli bir sald\u0131r\u0131y\u0131 test etmesi gerekti\u011finde y\u00fcr\u00fct\u00fclebilir. Bu \u015fekilde ekipler, sald\u0131r\u0131 modellerini ve ola\u011fand\u0131\u015f\u0131 g\u00fcnl\u00fck etkinli\u011fini nas\u0131l tespit edeceklerini bilmek i\u00e7in daha iyi e\u011fitilir. Siber g\u00fcvenlik toplulu\u011fu yeni istismarlar ke\u015ffetti\u011finde, bu istismarlar\u0131 sim\u00fcle etmek i\u00e7in komut dosyalar\u0131 kullan\u0131labilir. Bunun zaman alaca\u011f\u0131na dikkat edin, bu nedenle BAS, muhalif ticaret ara\u00e7lar\u0131 kadar g\u00fcncel olmayabilir. Test benzeri \u00e7\u0131kt\u0131, ortam\u0131n\u0131zda kolayca komut dosyas\u0131 yaz\u0131labilen a\u00e7\u0131klardan yararlanmaya sahip bilinen ka\u00e7 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n bulundu\u011funun teyididir.<\/p>\n<p>BAS, ekiplerin g\u00fcnl\u00fck sistemlerinde sald\u0131r\u0131 modellerini ve garip sald\u0131r\u0131lar\u0131 nas\u0131l tespit edeceklerini bilmelerini sa\u011flamak i\u00e7in g\u00fcvenlik yan\u0131tlar\u0131n\u0131 test etmek i\u00e7in en uygun y\u00f6ntemdir. Bu, mavi ekipler i\u00e7in harika bir e\u011fitim arac\u0131d\u0131r ancak genel olarak bilinmeyen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n ke\u015ffedilmesine neden olmaz. Bu, bir kalem testi de\u011fi\u015fimi olarak g\u00f6r\u00fclmemelidir ve genellikle komut dosyas\u0131yla yaz\u0131lm\u0131\u015f modeller, mevcut rakip ticari zanaat\u0131n gerisinde kal\u0131r.<\/p>\n<p><strong>Bug Bounty,<\/strong> yaz\u0131l\u0131m\u0131n\u0131z\u0131n g\u00fcvenli\u011fini test etmek ve sorumlu if\u015fa ilkelerine g\u00f6re \u015firketinize hata raporlar\u0131n\u0131 g\u00f6ndermek i\u00e7in iyi tan\u0131mlanm\u0131\u015f politikalar \u00e7er\u00e7evesinde uygulan\u0131r. Bir hata kan\u0131tlanabiliyorsa ve \u015firketinizin \u00f6ncelikli g\u00fcvenlik a\u00e7\u0131\u011f\u0131 kriterlerine uyuyorsa, hata avc\u0131s\u0131na 50 ila 100,500 ABD Dolar\u0131 aras\u0131nda bir para \u00f6d\u00fcl\u00fc verilebilir, ancak tipik hata \u00f6d\u00fcl\u00fc \u00f6d\u00fclleri yakla\u015f\u0131k 200 ila 1000 ABD Dolar\u0131 aras\u0131ndad\u0131r. De\u011ferli bir hata raporu i\u00e7in verilen para miktar\u0131, \u015firketin b\u00fct\u00e7esinin ve kullan\u0131c\u0131 taban\u0131n\u0131n b\u00fcy\u00fckl\u00fc\u011f\u00fc ve hatan\u0131n kritikli\u011fi gibi \u00e7e\u015fitli fakt\u00f6rlerden etkilenir.<\/p>\n<p><strong>Dinamik Uygulama G\u00fcvenli\u011fi Testi (DAST),<\/strong> otomatikle\u015ftirilmi\u015f bir tekniktir, ancak yaln\u0131zca \u00e7al\u0131\u015fan uygulamalar\u0131 test etmek i\u00e7indir. Bu nedenle, genellikle uygulama geli\u015ftiricileri taraf\u0131ndan kullan\u0131lan bir ara\u00e7t\u0131r. DAST en s\u0131k web uygulamalar\u0131 i\u00e7in kullan\u0131l\u0131r, ancak internete ba\u011fl\u0131 di\u011fer uygulamalar da bu \u015fekilde test edilebilir. \u0130nternetteki bir web uygulamas\u0131 gibi hedeflenen uygulama \u00e7al\u0131\u015f\u0131yor olmal\u0131d\u0131r. Y\u00fcr\u00fct\u00fclen istismarlar dinamiktir, bu nedenle penetrasyonun ilerlemesine ba\u011fl\u0131 olarak rotay\u0131 de\u011fi\u015ftirebilirler.<\/p>\n<p><strong>Risk de\u011ferlendirmelerine<\/strong> bazen tehdit de\u011ferlendirmeleri denir. Bir risk de\u011ferlendirmesinde g\u00fcvenlik ekibiniz, kurulu\u015funuzun veri varl\u0131klar\u0131 ve bu varl\u0131klar\u0131n hem siber sald\u0131r\u0131lar hem de do\u011fal afetler ve kazalar gibi k\u00f6t\u00fc ama\u00e7l\u0131 olmayan tehditler taraf\u0131ndan nas\u0131l tehdit edilebilece\u011fi hakk\u0131nda bildikleriyle i\u015fbirli\u011fi yapar. Riskler, olu\u015fma olas\u0131l\u0131klar\u0131na ve yol a\u00e7abilecek zarar\u0131n miktar\u0131na g\u00f6re belirlenir, tahmin edilir ve \u00f6nceliklendirilir.<\/p>\n<p><strong>Statik Uygulama G\u00fcvenli\u011fi Testi (SAST),<\/strong> DAST ile ayn\u0131 hedeflere sahiptir, ancak \u00fcretim modunda \u00e7al\u0131\u015fan uygulamalar i\u00e7in de\u011fil, derlenmeden \u00f6nce uygulama kodu i\u00e7indir. Bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 kaynak koddan anla\u015f\u0131l\u0131rsa &#8211; hepsi de\u011fil &#8211; SAST taraf\u0131ndan tespit edilebilir.<\/p>\n<p><strong>Masa \u00fcst\u00fc egzersizler<\/strong>, esas olarak, bir savunma g\u00fcvenlik i\u015flevi olan olay m\u00fcdahale ekipleri i\u00e7indir. \u0130yi yap\u0131ld\u0131\u011f\u0131nda e\u011flenceli bir m\u00fccadele olabilir ve olay m\u00fcdahale grubunuzun siber tehditlerle daha b\u00fcy\u00fck bir g\u00fcvenle y\u00fczle\u015fmesine yard\u0131mc\u0131 olabilir. Tatbikatta belirli sald\u0131r\u0131lar \u00f6neriliyor ve ekibin siber tehdidi nas\u0131l \u00f6nlemeleri, azaltmalar\u0131 veya kontrol alt\u0131na almalar\u0131 gerekti\u011fini bulmas\u0131 gerekiyor. Bayra\u011f\u0131 Yakala k\u0131rm\u0131z\u0131 tak\u0131m i\u00e7in ana e\u011fitici oyunsa, masa \u00fcst\u00fc mavi tak\u0131m i\u00e7in ana e\u011fitici oyundur. \u00c7\u0131kt\u0131 daha kendinden emin ve haz\u0131rl\u0131kl\u0131 bir ekip. Bazen, bir kurulu\u015fun tehdit modellemesi i\u00e7in iyile\u015ftirmeler de ortaya \u00e7\u0131kar. Ancak bu al\u0131\u015ft\u0131rmalar s\u0131ras\u0131nda ger\u00e7ek g\u00fcvenlik a\u00e7\u0131klar\u0131 s\u0131kl\u0131kla bulunmayacakt\u0131r.<\/p>\n<p>Bu ve di\u011fer yeni teknolojiler (\u00f6zellikle yapay zeka ve makine \u00f6\u011frenimi), g\u00fcvenlik liderleri i\u00e7in faydal\u0131 ara\u00e7lard\u0131r.<\/p>\n<p>Bilgisayar bilimcileri, bilgisayarlar\u0131n yaln\u0131zca rastgeleli\u011fi sim\u00fcle edebildi\u011fini bilirler, asl\u0131nda rastgele olmak i\u00e7in canl\u0131 bir varl\u0131k gerekir. Ve Synack Red Team gibi insan s\u0131zmac\u0131lar, insan siber sald\u0131rganlar\u0131n\u0131 ve d\u00fczenli olarak bulduklar\u0131 ciddi a\u00e7\u0131klar\u0131 sim\u00fcle etmede en iyisidir.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pentesting Gibi G\u00f6r\u00fcnen Ama Olmayan 6 Ara\u00e7 \u201cPentesting\u201d denilen her \u015fey pentest de\u011fildir. Farkl\u0131 g\u00fcndemleri olan farkl\u0131 payda\u015flar i\u00e7in farkl\u0131 metodolojiler kullanan \u00e7ok say\u0131da farkl\u0131 g\u00fcvenlik testi ve arac\u0131 vard\u0131r. Pentest ve ayr\u0131ca g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmesi, uyumluluk denetimi ve di\u011fer bi\u00e7imleri i\u00e7eren g\u00fcvenlik testleri daha&#8230;<\/p>","protected":false},"author":2,"featured_media":8136,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8135","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/pentesting-hakkinda-kacirdigimiz-noktalar\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Pentesting Gibi G\u00f6r\u00fcnen Ama Olmayan 6 Ara\u00e7 \u201cPentesting\u201d denilen her \u015fey pentest de\u011fildir. Farkl\u0131 g\u00fcndemleri olan farkl\u0131 payda\u015flar i\u00e7in farkl\u0131 metodolojiler kullanan \u00e7ok say\u0131da farkl\u0131 g\u00fcvenlik testi ve arac\u0131 vard\u0131r. Pentest ve ayr\u0131ca g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmesi, uyumluluk denetimi ve di\u011fer bi\u00e7imleri i\u00e7eren g\u00fcvenlik testleri daha...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/pentesting-hakkinda-kacirdigimiz-noktalar\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T10:52:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T11:10:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar\",\"datePublished\":\"2022-06-29T10:52:26+00:00\",\"dateModified\":\"2022-06-29T11:10:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/\"},\"wordCount\":1272,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/\",\"url\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/\",\"name\":\"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp\",\"datePublished\":\"2022-06-29T10:52:26+00:00\",\"dateModified\":\"2022-06-29T11:10:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/pentesting-hakkinda-kacirdigimiz-noktalar\/","og_locale":"en_GB","og_type":"article","og_title":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.","og_description":"Pentesting Gibi G\u00f6r\u00fcnen Ama Olmayan 6 Ara\u00e7 \u201cPentesting\u201d denilen her \u015fey pentest de\u011fildir. Farkl\u0131 g\u00fcndemleri olan farkl\u0131 payda\u015flar i\u00e7in farkl\u0131 metodolojiler kullanan \u00e7ok say\u0131da farkl\u0131 g\u00fcvenlik testi ve arac\u0131 vard\u0131r. Pentest ve ayr\u0131ca g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirmesi, uyumluluk denetimi ve di\u011fer bi\u00e7imleri i\u00e7eren g\u00fcvenlik testleri daha...","og_url":"https:\/\/www.inforte.com\/en\/pentesting-hakkinda-kacirdigimiz-noktalar\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2022-06-29T10:52:26+00:00","article_modified_time":"2022-06-29T11:10:21+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp","type":"image\/webp"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar","datePublished":"2022-06-29T10:52:26+00:00","dateModified":"2022-06-29T11:10:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/"},"wordCount":1272,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp","articleSection":["Inforte Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/","url":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/","name":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp","datePublished":"2022-06-29T10:52:26+00:00","dateModified":"2022-06-29T11:10:21+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/image_750x_5ebcf9a7a79b6.webp","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/pentesting-hakkinda-kacirdigimiz-noktalar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Pentesting Hakk\u0131nda Ka\u00e7\u0131rd\u0131\u011f\u0131m\u0131z Noktalar"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8135"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8135"}],"version-history":[{"count":2,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8135\/revisions"}],"predecessor-version":[{"id":8139,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8135\/revisions\/8139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8136"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}