{"id":2037,"date":"2020-07-13T09:00:18","date_gmt":"2020-07-13T13:00:18","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=2037"},"modified":"2022-09-22T07:59:12","modified_gmt":"2022-09-22T11:59:12","slug":"different-types-of-penetration-testing","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/","title":{"rendered":"Different Types Of Penetration Testing"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-2039 size-medium alignright\" src=\"\/wp-content\/uploads\/2020\/07\/person-working-on-multiple-computers-300x200.jpg\" alt=\"penetration testing used to find weaknesses in an organization infrastructure\" width=\"300\" height=\"200\" \/>As difficult as it may be to admit it, data breaches and other types of cyberattacks remain extremely common. One solution to such cyberattacks has proven highly efficient: <a href=\"\/what-is-penetration-testing\/\">penetration testing<\/a>. This process, which is also sometimes called \u201cethical hacking\u201d or \u201cwhite hat testing,\u201d involves a purposely planned assault on a system (hardware or software) and is designed to detect vulnerabilities that could be exploited. Fortunately, there are several methods for conducting penetration testing.<\/p>\n<h2>What Is A Penetration Test?<\/h2>\n<p>A penetration test is an IT exercise that consists of cybersecurity personnel attempting to identify and exploit weaknesses in an organization\u2019s computer systems. This type of simulated attack has been used by many organizations, both large and small, and for good reason. <\/p>\n<p>According to <a href=\"https:\/\/www.immuniweb.com\/resources\/application-security-matters\/\" rel=\"noopener\" target=\"_blank\">High-Tech Bridge Security Research<\/a>, 92% of web applications possess security flaws or vulnerabilities that can potentially be exploited. This research also revealed that approximately 16.2% of companies in the United States have at least two external web applications that allow personally identifiable information (PII) to enter via web forms and that run vulnerable versions of web software.<\/p>\n<h2>Five Types Of Penetration Testing<\/h2>\n<p>Penetration testing can typically be divided into five categories. Let\u2019s examine each of these categories closely.<\/p>\n<h3>Network Service Tests<\/h3>\n<p>This kind of penetration test is one of the most common requirements for testers. It primarily <a href=\"\/network-security-assessment\/\">aims to uncover vulnerabilities and other issues<\/a> in clients\u2019 network infrastructure. Access points for a network can be either internal or external. Pen testers should strive to target:<\/p>\n<ul>\n<li>Firewall configuration testing<\/li>\n<li>Firewall bypass testing<\/li>\n<li>IPS deception<\/li>\n<li>Domain name system (DNS)-level attacks<\/li>\n<\/ul>\n<h3>Web Application Tests<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/08\/digital-hygiene-can-be-done-to-prevent-technical-debt-for-an-organization-scaled-e1598041958350.jpg\" alt=\"digital hygiene can be done to prevent technical debt for an organization\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-2223\" \/>This is an intense and detailed type of pen test. Browsers, plug-ins, Applets, and web applications all belong to this pen testing category. <\/p>\n<p>Given that this type of test analyzes each web app\u2019s end-points, it requires significant planning. The methods used to test web applications continue to evolve.<\/p>\n<h3>Wireless Network Tests<\/h3>\n<p>This type of test is designed to <a href=\"\/remote-monitoring-management\/\">examine any wireless device that is deployed on a client\u2019s site<\/a>. Laptops, tablets, and smartphones are all examples of devices that fall under this category. Pen tests should be prepared for:\u00a0<\/p>\n<ul>\n<li>Access points for Wireless setup;<\/li>\n<li>Protocols utilized for Wireless configuration<\/li>\n<\/ul>\n<h3>Client-Side Tests<\/h3>\n<p>These types of tests are intended to detect security threats that arise locally. Errors in software applications that run on a user\u2019s workstation fall under this category. <\/p>\n<p>The use of uncertified open-source software (OSS) to generate or extend locally-developed applications could potentially lead to major threats and risks that are relatively difficult to foresee.\u00a0<\/p>\n<h3>Social Engineering Tests<\/h3>\n<p>These kinds of tests mimic assaults where an organization\u2019s employees could try to launch a breach. Nevertheless, social engineering tests can typically be divided into two subgroups:\u00a0<\/p>\n<ul>\n<li><strong>Remote tests:<\/strong> These tests are designed to fool an employee into compromising sensitive data thanks to electronic resources. A phishing attack via email can be used to conduct this type of test.\u00a0<\/li>\n<li><strong>Physical tests:<\/strong> As the name indicates, direct contact with the target is needed for this type of test. Human handling strategies such as Imitation and Intimidation can often be used to conduct physical tests.\u00a0<\/li>\n<\/ul>\n<p>There are also two different options for pen testing called \u201cblind testing\u201d and \u201cdouble-blind testing.\u201d Both of these methods of penetration testing involve very little-to-no knowledge of the targeted organization or the simulated attack itself.<\/p>\n<h2>How Often Should Penetration Tests Be Conducted?<\/h2>\n<p><img decoding=\"async\" class=\"alignright wp-image-2041 size-medium\" src=\"\/wp-content\/uploads\/2020\/07\/digital-wifi-icon-lock-icon-300x188.jpg\" alt=\"penetration testing is a means for cybersecurity \" width=\"300\" height=\"200\" \/>The answer to this question will likely vary depending on who you speak with. However, it is recommended to perform a penetration test at least once every year. WhiteHat Security\u2019s 2015 Website Security Statistics Report revealed that out of 118 organizations analyzed, 21% had performed a pen test once each year. <\/p>\n<p>Additionally, the average organization that conducted routine pen-testing possessed up to 10 security vulnerabilities, although just half of these weaknesses were ultimately resolved.<\/p>\n<h2>Speak With A Professional Managed IT Services Provider<\/h2>\n<p>Contact the experts at SeaGlass Technology in New York to learn more about the various types of penetration testing and what their benefits are. We are committed to providing customers with innovative <a href=\"\/it-security\/\">IT security solutions<\/a> that are customized to meet their unique needs. No matter how small or large your organization is, it is crucial to have a strong infrastructure, and penetration testing can help ensure this. <\/p>\n<p>If the vulnerabilities in your applications are exploited, sensitive data can become compromised through data breaches, which can cost you lots of time and large sums of money. Call SeaGlass Technology today at <a href=\"tel:+12128860790\">212.886.0790<\/a> or contact one of our specialists online to <a href=\"\/schedule-consultation\/\">schedule a consultation<\/a> or for more information about our <a href=\"\/managed-it-services-nyc\/\">managed IT services<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As difficult as it may be to admit it, data breaches and other types of cyberattacks remain extremely common. One solution to such cyberattacks has proven highly efficient: penetration testing. This process, which is also sometimes called \u201cethical hacking\u201d or \u201cwhite hat testing,\u201d involves a purposely planned assault on a system (hardware or software) and [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[51],"tags":[],"content_types":[63],"class_list":{"0":"post-2037","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-penetration-testing","8":"content_types-article","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Different Types Of Penetration Testing - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Different Types Of Penetration Testing - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-13T13:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-22T11:59:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"Different Types Of Penetration Testing\",\"datePublished\":\"2020-07-13T13:00:18+00:00\",\"dateModified\":\"2022-09-22T11:59:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-icons-hand-scaled-e1593800230560.jpg\",\"articleSection\":[\"Penetration Testing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/\",\"name\":\"Different Types Of Penetration Testing - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-icons-hand-scaled-e1593800230560.jpg\",\"datePublished\":\"2020-07-13T13:00:18+00:00\",\"dateModified\":\"2022-09-22T11:59:12+00:00\",\"description\":\"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-icons-hand-scaled-e1593800230560.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cybersecurity-icons-hand-scaled-e1593800230560.jpg\",\"width\":1600,\"height\":800,\"caption\":\"different types of penetration testing and their benefits\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/different-types-of-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Different Types Of Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Different Types Of Penetration Testing - SeaGlass Technology","description":"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Different Types Of Penetration Testing - SeaGlass Technology","og_description":"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.","og_url":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/","og_site_name":"SeaGlass Technology","article_published_time":"2020-07-13T13:00:18+00:00","article_modified_time":"2022-09-22T11:59:12+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"Different Types Of Penetration Testing","datePublished":"2020-07-13T13:00:18+00:00","dateModified":"2022-09-22T11:59:12+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/"},"wordCount":765,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","articleSection":["Penetration Testing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/","url":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/","name":"Different Types Of Penetration Testing - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","datePublished":"2020-07-13T13:00:18+00:00","dateModified":"2022-09-22T11:59:12+00:00","description":"Contact the NYC managed IT services provider to learn more about the different types of penetration testing and what their benefits are.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","width":1600,"height":800,"caption":"different types of penetration testing and their benefits"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/different-types-of-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"Different Types Of Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/07\/cybersecurity-icons-hand-scaled-e1593800230560.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=2037"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2037\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/2040"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=2037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=2037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=2037"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=2037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}