<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>InnovationM - Blog</provider_name><provider_url>https://www.innovationm.com/blog</provider_url><author_name>InnovationM Admin</author_name><author_url>https://www.innovationm.com/blog/author/innovationmadmin/</author_url><title>Penetration Testing Overview - InnovationM - Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="VbImHaRRq2"&gt;&lt;a href="https://www.innovationm.com/blog/penetration-testing-overview/"&gt;Penetration Testing Overview&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.innovationm.com/blog/penetration-testing-overview/embed/#?secret=VbImHaRRq2" width="600" height="338" title="&#x201C;Penetration Testing Overview&#x201D; &#x2014; InnovationM - Blog" data-secret="VbImHaRRq2" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.innovationm.com/blog/wp-content/uploads/2020/11/Penetration-Testing-Overview.png</thumbnail_url><thumbnail_width>960</thumbnail_width><thumbnail_height>540</thumbnail_height><description>Penetration testing is used to detect vulnerabilities present in the system in order to protect the sensitive data from the attackers who try to exploit the vulnerabilities present in the system. It basically determines the weak areas for any intruder to attack. This is required majorly when updating the system or adding new network infrastructure. [&hellip;]</description></oembed>
