[{"data":1,"prerenderedAt":76},["ShallowReactive",2],{"term-p\u002Fpentest":3,"related-p\u002Fpentest":59},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":16,"meta":44,"navigation":45,"path":46,"related":47,"seo":53,"sitemap":54,"stem":57,"subcategory":6,"__hash__":58},"terms\u002Fterms\u002Fp\u002Fpentest.md","Pentest",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"Pentest is just short for penetration testing — the art of ethically hacking your own systems to find weaknesses. A pentester gets paid to think like an attacker. They poke, prod, and probe until they find a way in, then write a report. Way better than waiting for a real hacker to find it first.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"Pentest (penetration test) encompasses scanning (Nmap, Nessus), vulnerability exploitation (Metasploit), web app testing (Burp Suite), and social engineering. Deliverables typically include a findings report with severity ratings (Critical\u002FHigh\u002FMedium\u002FLow) and remediation recommendations.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"The pentest report listed 3 critical findings to fix.\" \u002F \"We run internal pentests quarterly and external ones annually.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","Pentest is just short for penetration testing — the art of ethically hacking your own systems to find weaknesses.","intermediate","md",{},true,"\u002Fterms\u002Fp\u002Fpentest",[48,49,50,51,52],"Penetration Testing","Bug Bounty","Security Audit","Vulnerability","MITM",{"title":5,"description":41},{"changefreq":55,"priority":56},"weekly",0.7,"terms\u002Fp\u002Fpentest","sBNSwn_zuVYJYWsug6AtittDIk86c9YCk4uTMF4iSbo",[60,64,67,70,73],{"title":49,"path":61,"acronym":6,"category":40,"difficulty":62,"description":63},"\u002Fterms\u002Fb\u002Fbug-bounty","beginner","A bug bounty program pays ethical hackers to find security vulnerabilities in your product.",{"title":52,"path":65,"acronym":52,"category":40,"difficulty":42,"description":66},"\u002Fterms\u002Fm\u002Fmitm","MITM stands for Man-in-the-Middle. An attacker silently sits between your browser and the server, eavesdropping on everything.",{"title":48,"path":68,"acronym":6,"category":40,"difficulty":42,"description":69},"\u002Fterms\u002Fp\u002Fpenetration-testing","Penetration testing (pentesting) is hiring ethical hackers to try to break into your own systems before the real bad guys do.",{"title":50,"path":71,"acronym":6,"category":40,"difficulty":62,"description":72},"\u002Fterms\u002Fs\u002Fsecurity-audit","A security audit is a systematic review of your code, infrastructure, and processes to find security weaknesses.",{"title":51,"path":74,"acronym":6,"category":40,"difficulty":62,"description":75},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",1776518301478]