{"id":1062,"date":"2019-02-15T18:51:45","date_gmt":"2019-02-15T23:51:45","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1062"},"modified":"2019-11-01T19:37:42","modified_gmt":"2019-11-01T23:37:42","slug":"les-avantanges-des-tests-dintrusion-pour-les-applications-mobiles-et-les-applications-web","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/les-avantanges-des-tests-dintrusion-pour-les-applications-mobiles-et-les-applications-web\/","title":{"rendered":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB"},"content":{"rendered":"<h3>Les applications mobiles sont tr\u00e8s utilis\u00e9es dans les secteurs du commerce au d\u00e9tail, des soins de sant\u00e9 et des finances. Elles sont accessibles du bout des doigts et peuvent inclure des fonctionnalit\u00e9s sp\u00e9cifiques \u00e0 l\u2019appareil, contrairement aux applications web. Il faut cependant \u00eatre tr\u00e8s prudent au niveau de la s\u00e9curit\u00e9, pour les deux types d\u2019applications.\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/penetration-testing-services\">Les tests d\u2019intrusion<\/a>\u00a0pour les applications mobiles sont tous aussi importants que les tests d\u2019intrusion pour les applications web.<\/h3>\n<h2>Comparaison entre les applications web et mobiles<\/h2>\n<p>Les applications web sont ex\u00e9cut\u00e9es sur un serveur web et les utilisateurs y acc\u00e8dent via un navigateur. Ces applications peuvent \u00eatre aussi simples qu\u2019un ensemble de formulaires qui initient une action ou aussi compliqu\u00e9es qu\u2019un jeu vid\u00e9o au rythme soutenu ou un syst\u00e8me de planification des ressources de l\u2019entreprise (ERP). Une application mobile s\u2019ex\u00e9cute en tant qu\u2019application s\u00e9par\u00e9e du c\u00f4t\u00e9 du client, mais est souvent d\u00e9velopp\u00e9e avec du code de navigateur qui acc\u00e8de \u00e0 un seul site. Certaines applications mobiles sont effectivement des navigateurs \u00e0 une seule page alors que d\u2019autres ajoutent des fonctionnalit\u00e9s natives.<\/p>\n<p>Il existe \u00e9galement des applications mobiles enti\u00e8rement natives et elles font \u00e9galement face des enjeux de s\u00e9curit\u00e9. Mais elles sont plus vari\u00e9es et chacune doit \u00eatre abord\u00e9e selon ses propres fonctionnalit\u00e9s. Pour les besoins de cette discussion, nous consid\u00e9rerons les applications qui acc\u00e8dent principalement \u00e0 un serveur web, qu\u2019elles soient autonomes ou qu\u2019elles utilisent un navigateur ordinaire.<\/p>\n<h2>Les diff\u00e9rences de risques<\/h2>\n<p>Les applications mobiles et les applications web ont chacune leurs propres risques. Une application web coexiste dans le navigateur avec d\u2019autres sites. Elle a moins de contr\u00f4le sur son environnement et sur ce que l\u2019utilisateur peut faire, comparativement \u00e0 une application mobile. Elle peut s\u2019ex\u00e9cuter sur un navigateur d\u00e9suet sur lequel les plus r\u00e9centes correctifs n\u2019ont pas \u00e9t\u00e9 appliqu\u00e9s. Elle pourrait se retrouver sur un navigateur obscur, sur lequel elle n\u2019a jamais \u00e9t\u00e9 test\u00e9e. Il est laborieux mais n\u00e9cessaire de tester l\u2019application sur suffisamment d\u2019environnements diff\u00e9rents pour en avoir confiance.<\/p>\n<p>Une application mobile est pourvue de son propre navigateur, elle a donc plein contr\u00f4le sur le client et le serveur. Elle fait cependant face \u00e0 tellement de ses propres risques que l\u2019OWASP (Open Web Application Security Project) a compil\u00e9 une liste de risques pour les applications mobiles. Certains de ces risques sont particuli\u00e8rement pertinents pour les d\u00e9veloppeurs et les testeurs de s\u00e9curit\u00e9.<\/p>\n<ul>\n<li><strong>Communications non s\u00e9curis\u00e9es<\/strong>.\u00a0Les applications qui transmettent des donn\u00e9es sensibles devraient les transmettre de fa\u00e7on s\u00e9curitaire. Avec un navigateur, il suffit de configurer un serveur HTTPS et d\u2019utiliser des adresses URL ad\u00e9quates dans le navigateur. Une application mobile requiert plus de travail. Certaines le font insuffisamment, ignorant les erreurs de validation. D\u2019autres ne le font pas du tout, transmettant des mots de passe et des num\u00e9ros de cartes de cr\u00e9dit en texte clair.<\/li>\n<li><strong>Validation inad\u00e9quate de formulaires<\/strong>.\u00a0Les formulaires que l\u2019on retrouve dans les applications mobiles sont vuln\u00e9rables aux donn\u00e9es malveillantes s\u2019ils ne v\u00e9rifient pas suffisamment la saisie des donn\u00e9es. Les d\u00e9veloppeurs d\u2019applications mobiles sont parfois n\u00e9gligents car ils ne consid\u00e8rent pas leurs applications comme des applications web.<\/li>\n<li><strong>Stockage de donn\u00e9es non s\u00e9curitaire<\/strong>.\u00a0Une application mobile doit habituellement stocker certaines donn\u00e9es pour l\u2019utilisateur. Certaines applications stockent des renseignements sensibles sans les prot\u00e9ger, de sorte que d\u2019autres applications peuvent y acc\u00e9der.<\/li>\n<li><strong>Cl\u00e9s et mots de passe cod\u00e9s<\/strong>.\u00a0Il faudrait un d\u00e9veloppeur vraiment imprudent pour inclure une cl\u00e9 ou un mot de passe \u00e0 d\u00e9couvert dans le JavaScript d\u2019une page, mais les d\u00e9veloppeurs d\u2019applications mobiles ont plut\u00f4t une illusion de la s\u00e9curit\u00e9. Extraire un tel renseignement d\u2019une application mobile est plus difficile qu\u2019\u00e0 partir d\u2019un navigateur, mais c\u2019est tout de m\u00eame un risque dangereux.<\/li>\n<li><strong>Acc\u00e8s aux fonctions de l\u2019appareil<\/strong>.\u00a0Une application mobile peut demander l\u2019acc\u00e8s au microphone, \u00e0 la cam\u00e9ra, au courriel ou au carnet d\u2019adresses de l\u2019utilisateur. La plupart des utilisateurs accorderont l\u2019acc\u00e8s sans r\u00e9fl\u00e9chir. Si l\u2019application est compromise, elle aura acc\u00e8s \u00e0 des renseignements auxquels une application web ne peut acc\u00e9der facilement; elle pourrait m\u00eame espionner l\u2019utilisateur.<\/li>\n<\/ul>\n<p>Ironiquement, les probl\u00e8mes de s\u00e9curit\u00e9 des applications mobiles proviennent souvent d\u2019un exc\u00e8s de confiance. Parce que l\u2019application est autosuffisante, les d\u00e9veloppeurs ne s\u2019attardent pas toujours aux probl\u00e8mes de fa\u00e7on aussi prudente qu\u2019ils le feraient pour un site web.<\/p>\n<h2>L\u2019importance des tests d\u2019intrusion<\/h2>\n<p>Tout type d\u2019application qui acc\u00e8de \u00e0 du code du c\u00f4t\u00e9 serveur et qui traite des renseignements confidentiels doit faire l\u2019objet de tests pour s\u2019assurer qu\u2019elle est s\u00e9curitaire. Les tests d\u2019intrusion pour les applications mobiles diff\u00e8rent des tests d\u2019intrusion pour les applications web. Il n\u2019y a aucune barre d\u2019adresse dans une application mobile; les personnes ne peuvent donc pas saisir arbitrairement des URLs. Des outils de tests diff\u00e9rents sont requis. Des attaques r\u00e9elles ou simul\u00e9es peuvent impliquer de simuler l\u2019application et de reproduire ses demandes au serveur.<\/p>\n<p>Lorsque les utilisateurs accordent un acc\u00e8s \u00e0 leurs donn\u00e9es de sant\u00e9 ou de finances personnelles, ils ont le droit que ces donn\u00e9es soient prot\u00e9g\u00e9es. Les d\u00e9veloppeurs doivent se montrer dignes de confiance en soumettant leurs applications \u00e0 des test rigoureux. Orenda Security se sp\u00e9cialise dans les\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/penetration-testing-services\">tests d\u2019intrusion<\/a>, les tests dynamiques de s\u00e9curit\u00e9 des applications (DAST) et\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/application-assessments\/\">l\u2019\u00e9valuation des applications<\/a>. Nous desservons les secteurs du commerce au d\u00e9tail, des soins de sant\u00e9 et des finances.<\/p>\n<p>Contactez-nous d\u00e8s aujourd\u2019hui et demandez une soumission!<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1062\" data-postid=\"1062\" class=\"themify_builder_content themify_builder_content-1062 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Les applications mobiles sont tr\u00e8s utilis\u00e9es dans les secteurs du commerce au d\u00e9tail, des soins de sant\u00e9 et des finances. Elles sont accessibles du bout des doigts et peuvent inclure des fonctionnalit\u00e9s sp\u00e9cifiques \u00e0 l\u2019appareil, contrairement aux applications web. Il faut cependant \u00eatre tr\u00e8s prudent au niveau de la s\u00e9curit\u00e9, pour les deux types d\u2019applications.\u00a0Les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":827,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[39],"tags":[],"class_list":["post-1062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tests-dintrusion","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security<\/title>\n<meta name=\"description\" content=\"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it&#039;s secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it&#039;s secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-15T23:51:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:37:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB\",\"datePublished\":\"2019-02-15T23:51:45+00:00\",\"dateModified\":\"2019-11-01T23:37:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/\"},\"wordCount\":1028,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/danial-ricaros-785717-unsplash.jpg\",\"articleSection\":[\"Tests d\u2019intrusion\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/\",\"name\":\"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/danial-ricaros-785717-unsplash.jpg\",\"datePublished\":\"2019-02-15T23:51:45+00:00\",\"dateModified\":\"2019-11-01T23:37:42+00:00\",\"description\":\"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it's secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/danial-ricaros-785717-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/danial-ricaros-785717-unsplash.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/the-benefits-of-web-and-mobile-app-penetration-testing-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security","description":"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it's secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/","og_locale":"fr_FR","og_type":"article","og_title":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security","og_description":"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it's secure.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/","og_site_name":"Orenda Security","article_published_time":"2019-02-15T23:51:45+00:00","article_modified_time":"2019-11-01T23:37:42+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB","datePublished":"2019-02-15T23:51:45+00:00","dateModified":"2019-11-01T23:37:42+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/"},"wordCount":1028,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg","articleSection":["Tests d\u2019intrusion"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/","name":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg","datePublished":"2019-02-15T23:51:45+00:00","dateModified":"2019-11-01T23:37:42+00:00","description":"What is the importance of penetration testing. Any type of application that accesses server-side code and handles private information needs testing to ensure it's secure.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/danial-ricaros-785717-unsplash.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/the-benefits-of-web-and-mobile-app-penetration-testing-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"LES AVANTANGES DES TESTS D\u2019INTRUSION POUR LES APPLICATIONS MOBILES ET LES APPLICATIONS WEB"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1062"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1062\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media\/827"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}