{"id":60052,"date":"2025-08-05T08:50:58","date_gmt":"2025-08-05T06:50:58","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=60052"},"modified":"2025-12-10T16:38:38","modified_gmt":"2025-12-10T15:38:38","slug":"ot-und-iot-systeme-pentest","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/pentest\/ot-und-iot-systeme-pentest\/","title":{"rendered":"Pentesting OT and IoT Systems"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_color=\"rgba(99,99,99,0.47)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-pentests-header-ot-iot.jpg\" background_blend=\"multiply\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">Pentest OT and IoT Systems<\/h1>\n<p style=\"text-align: center;line-height: 130%\"><span>Protect your connected devices and industrial infrastructure<br \/><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"||5px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||11px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Where Are Your Typical Vulnerabilities?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Whether it\u2019s smart devices in the office, connected machines in production, or embedded systems in vehicles: Operational Technology (OT) and the Internet of Things (IoT) are essential parts of many business processes today, which also makes them attractive targets for attackers.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-pentests-kachel-ot-iot.jpg\" title_text=\"usd-security-analysis-pentests-kachel-ot-iot\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>A successful attack can have serious consequences, from data leakage and manipulation of control processes to complete system failure. At the same time, OT and IoT systems pose unique challenges: long lifecycles, limited standardization, restricted update capabilities, and often physical access to devices by third parties.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_padding=\"30px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>Pentesting Operational Technology (OT) by usd AG<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"17px||10px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>How Can You Ensure the Security of Your Industrial Control and Production Systems?<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Operational Technology (OT), including Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS), encompasses systems that monitor and control physical processes, such as those in manufacturing, energy supply, or logistics. Due to their long service life and high availability requirements, OT environments differ from conventional IT systems and require tailored testing approaches. The goal is to increase your production environment\u2019s resilience to targeted attacks without disrupting operations. Common vulnerabilities in OT environments include:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Misconfigured access to engineering workstations or HMI systems<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Weak or missing authentication at interfaces (e.g., remote maintenance)<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Poorly protected communication protocols (e.g., Modbus, OPC-UA)<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Outdated or unpatched control components<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Missing segmentation between IT and OT systems<\/div>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||10px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3>How Does usd AG Approach OT Pentesting?<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_4,1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p><span>Following<\/span><span> <\/span><span>a<\/span><span> <\/span><span>joint<\/span><span> <\/span><span>kick-off<\/span><span> <\/span><span>meeting<\/span><span>,<\/span><span> <\/span><span>we<\/span><span> <\/span><span>analyze<\/span><span> <\/span><span>your<\/span><span> <\/span><span>OT<\/span><span> <\/span><span>infrastructure<\/span><span> <\/span><span>for<\/span><span> <\/span><span>vulnerabilities. E<\/span><span>ither<\/span><span> <\/span><span>on-site<\/span><span> <\/span><span>or<\/span><span>,<\/span><span> <\/span><span>where<\/span><span> <\/span><span>possible<\/span><span>,<\/span><span> <\/span><span>in<\/span><span> <\/span><span>a<\/span><span> <\/span><span>lab<\/span><span> <\/span><span>environment<\/span><span>.<\/span><span> <\/span><span>We<\/span><span> <\/span><span>focus<\/span><span> <\/span><span>on<\/span><span> <\/span><span>realistic<\/span><span> <\/span><span>attack<\/span><span> <\/span><span>scenarios<\/span><span>,<\/span><span> <\/span><span>such<\/span><span> <\/span><span>as<\/span><span> <\/span><span>external<\/span><span> <\/span><span>threats<\/span><span> <\/span><span>or<\/span><span> <\/span><span>insiders<\/span><span> <\/span><span>with<\/span><span> <\/span><span>physical<\/span><span> <\/span><span>access<\/span><span>.<\/span><span> <\/span><span>The<\/span><span> <\/span><span>priority<\/span><span> <\/span><span>is<\/span><span> <\/span><span>identifying<\/span><span> <\/span><span>and<\/span><span> <\/span><span>assessing<\/span><span> <\/span><span>risks<\/span><span> <\/span><span>without<\/span><span> <\/span><span>endangering<\/span><span> <\/span><span>live<\/span><span> <\/span><span>operations.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/grafik-ot-system-pentest.svg\" title_text=\"grafik-ot-system-pentest\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"85%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.0\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.0\" _module_preset=\"default\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_testimonial author=\"Robin Plugge\" job_title=\"Senior Security Analyst &amp;  Expert for Pentesting OT and IoT Systems\" portrait_url=\"https:\/\/www.usd.de\/wp-content\/uploads\/Robin-Plugge_rund.png\" quote_icon_color=\"#F07F1D\" quote_icon_background_color=\"#FFFFFF\" font_icon=\"&#xe06a;||divi||400\" portrait_width=\"200px\" portrait_height=\"200px\" use_icon_font_size=\"on\" icon_font_size=\"35px\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"3%||2%||false|false\" animation_style=\"fade\" hover_enabled=\"0\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" border_radii_portrait=\"on|100%|100%|100%|100%\" border_color_all_portrait=\"RGBA(255,255,255,0)\" box_shadow_style_image=\"preset4\" box_shadow_horizontal_image=\"0px\" box_shadow_vertical_image=\"0px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p><span style=\"font-size: 18px;font-weight: 300\">In OT and IoT environments in particular, a specific pentest helps to identify security-critical vulnerabilities before they disrupt processes or endanger systems. A specialized pentest of OT and IoT systems thus creates a robust basis for protecting availability and operational security.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"30px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>Pentesting IoT, Embedded, and Hardware Systems by usd AG<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3>How Can You Identify Vulnerabilities in Your Networked Devices at an Early Stage?<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p>IoT devices and embedded systems are used across various domains: for example, in industry, automotive engineering, building automation, surveillance technology, or medical technology. These systems often collect, process, and transmit sensitive data while frequently lacking adequate protection against attacks. Typical vulnerabilities in IoT devices include:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Insecure firmware and bootloaders<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Weak or hardcoded credentials<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Manipulable hardware interfaces (e.g., UART, JTAG, SPI)<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Poorly implemented maintenance access or wireless protocols (e.g., BLE, ZigBee, LoRa)<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Security flaws in web or cloud components<\/div>\n<\/li>\n<li>\n<div class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">Broken access control via interfaces<\/div>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.24.1\" _module_preset=\"default\" custom_padding=\"17px||19px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3 class=\"TypographyPresentation TypographyPresentation--medium RichText3-paragraph--withVSpacingNormal RichText3-paragraph HighlightSol HighlightSol--buildingBlock\">How Does usd AG Approach Iot Pentesting?<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_4,1_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>We analyze the entire attack surface from hardware and firmware to connected cloud systems or mobile apps. Testing is typically conducted in our specialized lab under controlled conditions using dedicated tools and equipment. However, we are also happy to perform assessments on-site under real-world conditions. Both automated methods and manual techniques are used, such as reading memory components, reverse engineering firmware, or analyzing wireless communication.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/grafik-iot-system-pentest.svg\" title_text=\"grafik-iot-system-pentest\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"85%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"30px||19px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2><span>Are Your Systems Protected Against Attackers?<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pentest-webseite-IV-1.jpeg\" title_text=\"usd-pentest-webseite-IV\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||15px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]With our combined expertise in OT and IoT security, we help you identify vulnerabilities early and secure your systems sustainably. Have questions about a specific device or project? Feel free to contact us.[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact Us\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Get More Insights<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"-17px|auto||auto||\" custom_padding=\"23px|||||\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-ag-ot-iot-pentests.jpg\" background_position=\"center_right\" background_blend=\"multiply\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"2f9ba085-a5fa-4356-993b-05b9ace0780d\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: left\"><span style=\"color: #f07f1d\">More Security for Connected Systems:<\/span><span style=\"color: #ffffff\"> Pentesting OT and IoT Systems In a Nutshell<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/ot-und-iot-system-pentests-in-a-nutshell\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_enable_color=\"off\" background_enable_image=\"off\" background_blend=\"multiply\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pentest OT and IoT Systems Protect your connected devices and industrial infrastructureWhere Are Your Typical Vulnerabilities?Whether it\u2019s smart devices in the office, connected machines in production, or embedded systems in vehicles: Operational Technology (OT) and the Internet of Things (IoT) are essential parts of many business processes today, which also makes them attractive targets for [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":60034,"parent":40183,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-60052","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/60052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=60052"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/60052\/revisions"}],"predecessor-version":[{"id":62943,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/60052\/revisions\/62943"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/60034"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=60052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}