{"id":242312,"date":"2025-01-24T18:58:34","date_gmt":"2025-01-24T18:58:34","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/"},"modified":"2025-01-24T18:58:34","modified_gmt":"2025-01-24T18:58:34","slug":"can-penetration-testing-be-automated","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/","title":{"rendered":"Limitations of Automated Penetration Testing"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>The issue of <strong>leaked passwords<\/strong> has become a pressing concern in today&#039;s digital landscape, as countless individuals and organizations find themselves vulnerable to <strong>cyberattacks<\/strong>. These leaks often occur through <strong>data breaches<\/strong> on websites, social media platforms, and online services, where <strong>sensitive user information<\/strong> is exposed. The significance of leaked passwords lies in their potential to compromise accounts, leading to unauthorized access to personal and financial data. For users, this highlights the critical importance of practicing good cybersecurity hygiene, such as using unique passwords and enabling <strong>two-factor authentication<\/strong>, to mitigate risks and safeguard their digital identities.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#False_Positives_and_False_Negatives\" >False Positives and False Negatives<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Coverage_and_System_Complexity\" >Coverage and System Complexity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Missing_Human_Intelligence\" >Missing Human Intelligence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Web_Application_Testing_Challenges\" >Web Application Testing Challenges<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Remediation_Planning_Issues\" >Remediation Planning Issues<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Context_and_Adaptability_Limitations\" >Context and Adaptability Limitations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#How_Much_Does_Automated_Penetration_Testing_Typically_Cost_Compared_to_Manual_Testing\" >How Much Does Automated Penetration Testing Typically Cost Compared to Manual Testing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Can_Automated_Testing_Tools_Be_Effectively_Used_for_Cloud-Based_Infrastructure\" >Can Automated Testing Tools Be Effectively Used for Cloud-Based Infrastructure?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#What_Programming_Knowledge_Is_Required_to_Operate_Automated_Penetration_Testing_Tools\" >What Programming Knowledge Is Required to Operate Automated Penetration Testing Tools?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#How_Often_Should_Organizations_Run_Automated_Penetration_Tests\" >How Often Should Organizations Run Automated Penetration Tests?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#Which_Automated_Penetration_Testing_Tools_Are_Most_Recommended_for_Beginners\" >Which Automated Penetration Testing Tools Are Most Recommended for Beginners?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/can-penetration-testing-be-automated\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Automated tools generate high rates of false positives and false negatives, reducing their reliability and requiring manual verification.<\/li>\n<li>Complex web applications with dynamic elements and frequent changes pose significant challenges for automated testing tools.<\/li>\n<li>Automated tools lack human intuition and creativity needed to identify unconventional vulnerabilities or devise innovative attack scenarios.<\/li>\n<li>Tools struggle to understand broader system context and business logic, leading to missed vulnerabilities in intricate environments.<\/li>\n<li>Automated testing provides limited remediation guidance and cannot develop comprehensive solution plans for complex security issues.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"False_Positives_and_False_Negatives\"><\/span>False Positives and False Negatives<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/misclassification_in_data_analysis.jpg\" alt=\"\" title=\"\"><\/div>\n<p>When examining <strong>automated penetration testing limitations<\/strong>, <strong>false positives<\/strong> and <strong>false negatives<\/strong> pose significant challenges that can undermine an organization&#039;s <strong>security efforts<\/strong>.<\/p>\n<p>Think of false positives like crying &#034;wolf&#034; when there&#039;s no real danger &#8211; they waste time and make people less likely to believe real warnings. Have you ever had a fire drill at school that turned out to be just a test? That&#039;s kind of like a false positive! Modern systems create <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/redfoxsec.com\/blog\/understanding-false-positives-in-penetration-testing\/\">complex testing environments<\/a> that increase the likelihood of false positives.<\/p>\n<p>False negatives are trickier &#8211; they&#039;re like missing a hole in your boat because you didn&#039;t look carefully enough. Just like you might miss a spot when cleaning your room, automated tools can miss real security problems.<\/p>\n<p>I&#039;ve found that combining smart computer tools with <strong>human expertise<\/strong> works best. It&#039;s like having both a calculator and your brain to solve a math problem!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Coverage_and_System_Complexity\"><\/span>Coverage and System Complexity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Although <strong>automated penetration testing tools<\/strong> excel at scanning networks quickly, they often struggle with large, <strong>complex systems<\/strong> that require <strong>deeper analysis<\/strong>.<\/p>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.getastra.com\/blog\/security-audit\/automated-penetration-testing\/\">Manual testing<\/a> provides more thorough vulnerability detection that automated tools cannot match. It&#039;s like trying to find a tiny toy in a huge playground &#8211; you need more time to look everywhere carefully! When systems become as complicated as a giant maze, automated tools might miss some <strong>hidden spots<\/strong> that bad guys could use to sneak in.<\/p>\n<ul>\n<li>Networks can be as tricky as puzzle boxes with many moving parts<\/li>\n<li>Big systems need extra time to scan &#8211; sometimes up to two whole days!<\/li>\n<li>Automated tools get tired when checking super-large networks<\/li>\n<li>Some security problems are like secret passages that only humans can spot<\/li>\n<li>Complex systems change fast, just like how your favorite video game updates<\/li>\n<\/ul>\n<p>Want to know something cool? Even the smartest computer tools need help from <strong>real people<\/strong> to stay safe!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Missing_Human_Intelligence\"><\/span>Missing Human Intelligence<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/lack_of_human_insight.jpg\" alt=\"\" title=\"\"><\/div>\n<p>Despite their efficiency in routine tasks, <strong>automated penetration testing tools<\/strong> lack the <strong>irreplaceable human elements<\/strong> of <strong>creativity, intuition, and adaptability<\/strong>.<\/p>\n<p>Think of it like playing hide-and-seek &#8211; while a robot might check all the obvious spots, a clever human player recognizes the secret hiding places nobody would expect!<\/p>\n<p>You are aware of how you can spot things your friends miss during a scavenger hunt? That&#039;s exactly what human testers do!<\/p>\n<p>We comprehend the <strong>bigger picture<\/strong>, like knowing which treasures are the most valuable to protect. We can think up new ways bad guys might try to break in, just like you might figure out a new shortcut to the playground.<\/p>\n<p>Plus, when we <strong>find problems<\/strong>, we know exactly how to fix them &#8211; something computers just can&#039;t do on their own.<\/p>\n<p>The <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/amatas.com\/blog\/the-pros-and-cons-of-manual-and-automated-penetration-testing\/\">inability to perform pivot<\/a> attacks significantly limits automated tools from replicating sophisticated real-world attack scenarios.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Web_Application_Testing_Challenges\"><\/span>Web Application Testing Challenges<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The world of web application testing presents <strong>unique obstacles<\/strong> that automated tools struggle to overcome. When I&#039;m testing websites, I often find that computers alone can&#039;t understand <strong>tricky business rules<\/strong> &#8211; kind of like how a robot wouldn&#039;t know why we choose pizza over broccoli!<\/p>\n<p>Modern web apps are like complex puzzles that need a human brain to solve them properly. <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.vumetric.com\/blog\/why-automated-application-penetration-testing-is-not-enough\/\">Manual penetration tests<\/a> are essential for discovering critical vulnerabilities, especially in environments that require <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-in-education\/\">MFA in Education<\/a> to secure sensitive data.<\/p>\n<ul>\n<li>Dynamic elements pop up unexpectedly, just like a jack-in-the-box<\/li>\n<li>False results happen when computers get confused by website changes<\/li>\n<li>Test scripts need constant updates as websites grow and change<\/li>\n<li>Too many automated tests can make websites slow down<\/li>\n<li>Complex business rules are hard for computers to understand<\/li>\n<\/ul>\n<p>Have you ever played a game where the rules keep changing? That&#039;s what web testing is like! We need human testers to catch the <strong>sneaky problems<\/strong> that computers miss.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Remediation_Planning_Issues\"><\/span>Remediation Planning Issues<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/remediation_strategy_development_challenges.jpg\" alt=\"\" title=\"\"><\/div>\n<p>When <strong>automated tools<\/strong> flag <strong>security issues<\/strong>, creating effective <strong>remediation plans<\/strong> remains a significant challenge that machines can&#039;t solve alone.<\/p>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.cycognito.com\/learn\/exposure-management\/automated-pentesting.php\">Complex vulnerabilities<\/a> require detailed manual analysis by experts to develop proper fixes.<\/p>\n<p>It&#039;s kind of like when you&#039;re playing a video game &#8211; the game might tell you there&#039;s a problem, but you need to figure out how to fix it yourself!<\/p>\n<p>You know how your teacher helps you solve tricky math problems? That&#039;s exactly what security experts do! They look at all the problems the automated tools found and use their <strong>special knowledge<\/strong> to make a plan to fix them.<\/p>\n<p>I can&#039;t just tell a computer &#034;Hey, make everything secure!&#034; &#8211; it needs a <strong>human brain<\/strong> to think through the best solutions.<\/p>\n<p>Have you ever done a puzzle? That&#039;s what remediation planning is like &#8211; putting all the pieces together in just the right way!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Context_and_Adaptability_Limitations\"><\/span>Context and Adaptability Limitations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Because <strong>automated penetration testing tools<\/strong> follow strict predefined rules, they struggle to adapt to <strong>novel threats<\/strong> and complex scenarios that require <strong>human insight<\/strong>.<\/p>\n<p>Think of it like a robot trying to play hide-and-seek &#8211; it can only look in places it&#039;s been told about! These tools can&#039;t think creatively or understand special situations like a human can. They&#039;re kind of like following a recipe without knowing how to adjust if you&#039;re missing an ingredient. The tools often produce <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.sprocketsecurity.com\/resources\/automated-penetration-testing-process-pros-cons-and-best-practices-2\">false positives<\/a> that require manual verification.<\/p>\n<ul>\n<li>Can&#039;t keep up with fast-changing systems and new threats<\/li>\n<li>Misses tricky problems that need human creativity to spot<\/li>\n<li>Has trouble understanding unique system setups<\/li>\n<li>Can&#039;t adapt well to changes, like when websites get updated<\/li>\n<li>Struggles to understand how different parts work together<\/li>\n<\/ul>\n<p>Just like you need both a map and a smart explorer to find treasure, <strong>good security testing<\/strong> needs both tools and human experts!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Does_Automated_Penetration_Testing_Typically_Cost_Compared_to_Manual_Testing\"><\/span>How Much Does Automated Penetration Testing Typically Cost Compared to Manual Testing?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you about <strong>testing costs<\/strong> &#8211; it&#039;s like comparing a robot helper to a human expert!<\/p>\n<p>Automated testing is way cheaper, usually costing a few hundred to thousand dollars for the tools.<\/p>\n<p>Manual testing costs way more because you&#039;re paying real people &#8211; usually $8,900 to $53,700!<\/p>\n<p>Think of it like buying a dishwasher versus hiring someone to wash dishes every day.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Automated_Testing_Tools_Be_Effectively_Used_for_Cloud-Based_Infrastructure\"><\/span>Can Automated Testing Tools Be Effectively Used for Cloud-Based Infrastructure?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve found that <strong>automated tools<\/strong> can be super helpful for testing cloud systems, but they&#039;re like robots that need human friends to work best!<\/p>\n<p>They&#039;re great at quickly scanning for <strong>basic problems<\/strong> &#8211; just like how a metal detector finds coins on the beach.<\/p>\n<p>But they can miss tricky issues that only humans can spot.<\/p>\n<p>That&#039;s why I always recommend using both automated tools and <strong>expert testers<\/strong> together for the best results.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Programming_Knowledge_Is_Required_to_Operate_Automated_Penetration_Testing_Tools\"><\/span>What Programming Knowledge Is Required to Operate Automated Penetration Testing Tools?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what you need to learn to use <strong>automated pen-testing tools<\/strong>!<\/p>\n<p>You&#039;ll want to start with Python &#8211; it&#039;s like the <strong>Swiss Army knife<\/strong> of hacking tools. You&#039;ll also need some PowerShell for Windows stuff and Bash for Linux.<\/p>\n<p>Knowing how networks work is super important too. Think of it like learning the rules of a video game before you can play it well.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Organizations_Run_Automated_Penetration_Tests\"><\/span>How Often Should Organizations Run Automated Penetration Tests?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend running <strong>automated penetration tests<\/strong> at least quarterly for most organizations, but you&#039;ll want to adjust based on your specific needs.<\/p>\n<p>If you&#039;re handling <strong>sensitive data<\/strong> or making frequent system changes, I&#039;d bump that up to monthly testing.<\/p>\n<p>Annual testing is the bare minimum &#8211; think of it like getting your car inspected!<\/p>\n<p>The key is finding a rhythm that matches your <strong>risk level<\/strong> and system complexity.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Which_Automated_Penetration_Testing_Tools_Are_Most_Recommended_for_Beginners\"><\/span>Which Automated Penetration Testing Tools Are Most Recommended for Beginners?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For beginners, I&#039;d start with Zed Attack Proxy (ZAP) &#8211; it&#039;s like having training wheels on your first bike!<\/p>\n<p>It&#039;s free and super easy to use.<\/p>\n<p>Nmap is another great tool that&#039;ll help you learn the basics, just like learning your ABCs.<\/p>\n<p>Burp Suite&#039;s free version is perfect too, with lots of helpful guides.<\/p>\n<p>These tools are like your first set of building blocks in cybersecurity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While <strong>automated penetration testing tools<\/strong> provide a valuable first step in identifying <strong>security vulnerabilities<\/strong>, they can&#039;t replace the nuanced understanding that human testers bring to the table. This highlights the importance of a comprehensive security strategy, where <strong>password security<\/strong> plays a critical role. Weak or poorly managed passwords can offer an easy entry point for hackers, making it essential to adopt <strong>robust password management practices<\/strong>.<\/p>\n<p>To bolster your security further, consider utilizing a <strong>secure password management solution<\/strong>. By effectively managing your passwords and using advanced techniques like passkeys, you can significantly reduce the risk of <strong>unauthorized access<\/strong>. Ready to take control of your password security? Sign up for a free account today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and experience the peace of mind that comes with knowing your digital assets are protected. Don&#039;t wait&#x2014;secure your online presence now!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Testing tools can scan for vulnerabilities, but their blind spots and limitations might leave your system more exposed than you realize.<\/p>\n","protected":false},"author":5,"featured_media":242311,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[14428,12515,26465],"class_list":["post-242312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-automated-testing","tag-security-risks","tag-vulnerability-assessment"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=242312"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242312\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/242311"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=242312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=242312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=242312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}