{"id":2032,"date":"2020-07-09T09:00:19","date_gmt":"2020-07-09T13:00:19","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=2032"},"modified":"2021-01-13T10:49:43","modified_gmt":"2021-01-13T15:49:43","slug":"what-is-penetration-testing","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/","title":{"rendered":"What Is Penetration Testing?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-2034 size-medium\" src=\"\/wp-content\/uploads\/2020\/07\/hooded-guy-laptop-multiple-screens-300x200.jpg\" alt=\"companies unaware of vulnerabilities are susceptible to cyberattacks \" width=\"300\" height=\"200\" \/>Have you ever been the target of a cyberattack and felt concerned that your information systems possess certain weaknesses? Fortunately, there is an effective way to identify such vulnerabilities and prevent them from being exploited: penetration testing. Many organizations from a variety of industries conduct this type of testing. According to a 2015 study by WhiteHat Security, 92% of the 118 organizations analyzed had performed pen-testing at least once as part of their cybersecurity initiatives. Additionally, 21% of these organizations<a href=\"https:\/\/info.whitehatsec.com\/rs\/whitehatsecurity\/images\/2015-Stats-Report.pdf\"> conducted a penetration test once annually<\/a>. Let\u2019s take a close look at this process and what its benefits are.<\/p>\n<h2>What Exactly Is Penetration Testing?<\/h2>\n<p>Regardless of an organization\u2019s size or the strength of its infrastructure, applications and networks can easily be exploited if certain precautions aren\u2019t taken. It\u2019s important to note that  <a href=\"\/penetration-testing\/\">penetration testing<\/a>, which is also known as ethical hacking, is a simulated cyberattack. With respect to web application security, pen testing is frequently utilized in order to augment a web application firewall (WAF). This type of firewall assesses requests that enter applications and halt attacks. Penetration testing can <a href=\"\/different-types-of-penetration-testing\/\">include the attempted breach of many types of application systems<\/a> (e.g. APIs) to detect vulnerabilities. A pen test can offer insights that can then be utilized to optimize your WAF security policies.<\/p>\n<h2>How It Works<\/h2>\n<p>Penetration testing typically occurs in five stages:\u00a0<\/p>\n<ul>\n<li><strong>Planning and Reconnaissance:<\/strong> This initial stage involves defining the testing scope and goals and collecting intelligence about things such as mail servers to comprehend how a target functions.<\/li>\n<p><\/p>\n<li><strong>Scanning:<\/strong> After collecting intelligence, the next objective is to understand how an application will react to attempted intrusions. In order to achieve this, two types of processes intended to analyze application code are utilized: static analysis and dynamic analysis.<\/li>\n<p><\/p>\n<li><strong>Gaining Access:<\/strong> In this stage, web application attacks like SQL injection, and cross-site scripting are utilized to identify vulnerabilities.<\/li>\n<p><\/p>\n<li><strong>Maintaining Access:<\/strong> This step\u2019s objective is to determine whether the vulnerability can be utilized to reach a near-constant presence in whatever system is being exploited.<\/li>\n<p><\/p>\n<li><strong>Analysis\/Covering Tracks:<\/strong> This final stage consists of compiling all the results of the pen test into a report that outlines which vulnerabilities were exploited, what types of sensitive information were compromised, and the duration of time for which the pen tester was able to go unnoticed in the system.<\/li>\n<\/ul>\n<h2>The Benefits Of Penetration Testing<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/03\/IT-team-testing-network-security.jpg\" alt=\"IT team testing network security\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-1757\" \/>There are five common methods for conducting penetration testing: external testing, internal testing, blind testing, double-blind testing, and targeted testing. Each one offers at least one benefit. For example, in a blind test, a pen tester only knows the name of the targeted entity. The advantage of this method is that it can provide you with a real-time look at how a genuine attack on an application or system would occur. Targeted testing also offers real-time analysis of an assault and allows for continuous, mutual feedback between security personnel and the hacker\/malicious agent. A double-blind test, meanwhile, is one of the methods that can most accurately simulate reality because your security team wouldn\u2019t have enough time to establish its defenses prior to an attempted breach.\u00a0<\/p>\n<p>Ultimately, conducting a pen test regularly can help your organization reveal genuine security risks and threats, ensure business continuity, and maintain a certain level of trust and confidence between you and your clients, business partners, and suppliers. The truth is that many web applications have glaring security flaws or weaknesses that are exploitable. According to information security company Trustwave\u2019s 2018 Global Security Report, 59% of tested web applications have at least one session management vulnerability. Even seemingly small input validation errors such as neglect to sanitize user input can lead to vulnerabilities.\u00a0<\/p>\n<p>Additionally, holding training sessions and seminars on penetration testing for all your employees can help generate more awareness about how to properly respond to future cyberattacks.\u00a0<\/p>\n<h2>Speak With An IT Security Professional At SeaGlass<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/03\/pentration-testing-being-performed-by-IT-tech.jpg\" alt=\"penetration testing being performed by IT tech\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-1729\" \/>Contact the IT security experts at SeaGlass Technology in New York to learn more about the advantages of penetration testing and exactly how this process works. We are dedicated to providing our customers with <a href=\"\/network-security-solutions\/\">comprehensive and innovative IT solutions<\/a> that are customized to meet each client\u2019s unique needs.\u00a0<\/p>\n<p>The team at SeaGlass Technology has extensive experience with penetration testing and can assist your organization in preventing data breaches and other cyberattacks, which can take a significant time to recover from, and which can end up costing you thousands of dollars. Call SeaGlass Technology today at <a href=\" tel:+12128860790\">(212) 886-0790<\/a> or contact us online to <a href=\" \/schedule-consultation\/\">schedule a consultation<\/a> with one of our specialists or for more information about our services. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever been the target of a cyberattack and felt concerned that your information systems possess certain weaknesses? Fortunately, there is an effective way to identify such vulnerabilities and prevent them from being exploited: penetration testing. Many organizations from a variety of industries conduct this type of testing. According to a 2015 study by [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2036,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[51],"tags":[],"content_types":[],"class_list":{"0":"post-2032","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-penetration-testing","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Penetration Testing? - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Penetration Testing? - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-09T13:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-13T15:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"What Is Penetration Testing?\",\"datePublished\":\"2020-07-09T13:00:19+00:00\",\"dateModified\":\"2021-01-13T15:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg\",\"articleSection\":[\"Penetration Testing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/\",\"name\":\"What Is Penetration Testing? - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg\",\"datePublished\":\"2020-07-09T13:00:19+00:00\",\"dateModified\":\"2021-01-13T15:49:43+00:00\",\"description\":\"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg\",\"width\":1600,\"height\":800,\"caption\":\"penetration testing for cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Penetration Testing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Penetration Testing? - SeaGlass Technology","description":"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"What Is Penetration Testing? - SeaGlass Technology","og_description":"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.","og_url":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/","og_site_name":"SeaGlass Technology","article_published_time":"2020-07-09T13:00:19+00:00","article_modified_time":"2021-01-13T15:49:43+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"What Is Penetration Testing?","datePublished":"2020-07-09T13:00:19+00:00","dateModified":"2021-01-13T15:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/"},"wordCount":763,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","articleSection":["Penetration Testing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/","url":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/","name":"What Is Penetration Testing? - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","datePublished":"2020-07-09T13:00:19+00:00","dateModified":"2021-01-13T15:49:43+00:00","description":"Read here to take a look and learn more about how penetration testing can help your business improve in areas of weakness.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","width":1600,"height":800,"caption":"penetration testing for cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/what-is-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"What Is Penetration Testing?"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-two-screens-hand-scaled-e1593717128597.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=2032"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2032\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/2036"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=2032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=2032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=2032"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=2032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}