{"id":22206,"date":"2026-03-19T09:27:40","date_gmt":"2026-03-19T09:27:40","guid":{"rendered":"https:\/\/www.synetis.com\/hardware-penetration-testing\/"},"modified":"2026-05-11T12:05:02","modified_gmt":"2026-05-11T12:05:02","slug":"hardware-penetration-testing","status":"publish","type":"page","link":"https:\/\/www.synetis.com\/en\/ssi-audit\/hardware-penetration-testing\/","title":{"rendered":"Hardware penetration testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22206\" class=\"elementor elementor-22206 elementor-17146\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7832a80 e-flex e-con-boxed e-con e-parent\" data-id=\"7832a80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e4f659 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3e4f659\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3605d1 elementor-widget elementor-widget-shortcode\" data-id=\"c3605d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/\" title=\"Accueil\">Accueil<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/ssi-audit\/\" title=\"SSI audit\">SSI audit<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\tHardware penetration testing\n<\/span><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30325ff elementor-widget elementor-widget-heading\" data-id=\"30325ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Hardware penetration testing<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05554ba elementor-widget elementor-widget-text-editor\" data-id=\"05554ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208d7a7 elementor-widget elementor-widget-text-editor\" data-id=\"208d7a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-0427db3 elementor-widget elementor-widget-text-editor\" data-id=\"0427db3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-ff93c07 elementor-widget elementor-widget-text-editor\" data-id=\"ff93c07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Identify security flaws in the components of your devices.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-897e4aa elementor-invisible elementor-widget elementor-widget-button\" data-id=\"897e4aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-audit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact our teams<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0162c2 e-flex e-con-boxed e-con e-parent\" data-id=\"c0162c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a04d67 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5a04d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eliminate technological grey areas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cca607 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7cca607\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A distinction should be made between two types of hardware pentest:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9955cc2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"9955cc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pentesting a workstation (laptop, workstation, etc.);<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pentesting a connected object (IoT), i.e. a piece of equipment with a specific function (e.g. a measurement or telemetry box).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5819c8f elementor-widget elementor-widget-deensimc-stacked-slider\" data-id=\"5819c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"deensimc-stacked-slider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"deensimc-stacked-container\">\n\t\t\t<div class=\"deensimc-image-slider-main deensimc-content right bottom-mobile\" data-autoplay=\"yes\"\n\t\t\t\tdata-animation-speed=\"2000\">\n\t\t\t\t<!-- Rendering slider content  -->\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-slider-content\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-slider-heading\">\n\t\t\t\t<h3 class=\"deensimc-content-title\"> Pentesting a workstation : <\/h3>\t\t\t<\/div>\n\t\t\n\t\t\t\t\t<div class=\"deensimc-slider-des\">\n\t\t\t\t<p class=\"deensimc-content-description\">\n\t\t\t\t\tThe aim is not to test the robustness of the equipment, but to identify intrinsic weaknesses linked to its design.\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- Rendering slider images -->\n\t\t\t\t<div class=\"deensimc-slider-media-wrapper\">\n\t\t\t\t\t<div class=\"deensimc-slider-media deensimc-ds-swiper swiper\">\n\t\t\t\t\t\t<div class=\"deensimc-slider-img swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/schema-pentest-2.jpg\" \/>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/schema-pentest-1.jpg\" \/>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<noscript>\n\t\t\t<div class=\"deensimc-noscript-notice\" role=\"note\">\n\t\t\t\tThis section requires JavaScript to load properly. Please enable JavaScript in your browser and reload the page.\t\t\t<\/div>\n\t\t<\/noscript>\n\t\t<div class=\"elementor-element elementor-element-7613b88 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7613b88\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In this case, the customer is not the manufacturer of the audited workstation, and therefore has no precise knowledge of its hardware design.<\/p><p>Workstation pentesting enables risk analysis to be adapted to take account of new potential threats linked to the hardware in use.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfd697f elementor-widget elementor-widget-deensimc-stacked-slider\" data-id=\"bfd697f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"deensimc-stacked-slider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"deensimc-stacked-container\">\n\t\t\t<div class=\"deensimc-image-slider-main deensimc-content left bottom-mobile\" data-autoplay=\"yes\"\n\t\t\t\tdata-animation-speed=\"2000\">\n\t\t\t\t<!-- Rendering slider content  -->\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-slider-content\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-slider-heading\">\n\t\t\t\t<h3 class=\"deensimc-content-title\"> Pentest IoT : <\/h3>\t\t\t<\/div>\n\t\t\n\t\t\t\t\t<div class=\"deensimc-slider-des\">\n\t\t\t\t<p class=\"deensimc-content-description\">\n\t\t\t\t\tIn the case of IoT pentesting, the customer may be the designer of the equipment to be audited, or he may wish to have an analysis carried out on one or more off-the-shelf devices.\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- Rendering slider images -->\n\t\t\t\t<div class=\"deensimc-slider-media-wrapper\">\n\t\t\t\t\t<div class=\"deensimc-slider-media deensimc-ds-swiper swiper\">\n\t\t\t\t\t\t<div class=\"deensimc-slider-img swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/pentest-IOT-1.jpg\" \/>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/pentest-IOT-2.jpg\" \/>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/pentest-IOT-3.jpg\" \/>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<noscript>\n\t\t\t<div class=\"deensimc-noscript-notice\" role=\"note\">\n\t\t\t\tThis section requires JavaScript to load properly. Please enable JavaScript in your browser and reload the page.\t\t\t<\/div>\n\t\t<\/noscript>\n\t\t<div class=\"elementor-element elementor-element-42256f2 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"42256f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The purpose of the audit is to <b>assess the robustness of the product in the face of known attacks<\/b>, with the aim of<b> strengthening its security and improving its design <\/b>if the customer is the designer.<\/p><p><b><\/b>If the customer has purchased an off-the-shelf product, the purpose of the audit is to<b> highlight the risks associated with using the equipment <\/b>, or to <b>offer a safety trade-off <\/b>if the customer wishes to choose between several pieces of equipment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4dfaf54 e-flex e-con-boxed e-con e-parent\" data-id=\"4dfaf54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ca605c2 e-con-full e-flex e-con e-child\" data-id=\"ca605c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-59b8e2f e-con-full e-flex e-con e-child\" data-id=\"59b8e2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-810e8d4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"810e8d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discover the benefits of hardware intrusion testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ffa9c5 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"9ffa9c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\">Pentesting a workstation :<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3328459 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"3328459\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Identification of intrinsic design vulnerabilities:<\/b> pentesting reveals hardware or architectural weaknesses specific to the equipment, often invisible in a conventional software audit.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Improved risk analysis:<\/b> as the vulnerabilities identified are rarely correctable (because they are linked to the design of the hardware), the audit helps to refine the risk analysis, in particular by specifying the conditions or usage profiles to be avoided (e.g. discouraging the use of certain workstations for sensitive users (VIPs, administrators, etc.)).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Decision support prior to purchase:<\/b> as part of a comparative study of several workstations (e.g. prior to the renewal of your IT infrastructure), this type of audit enables you to assess the robustness of the equipment available on the market, and guide your choice towards the most secure models.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ac3ec7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3ac3ec7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5657019 e-con-full e-flex e-con e-child\" data-id=\"5657019\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cbd8997 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"cbd8997\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d0e85e e-con-full e-flex e-con e-child\" data-id=\"9d0e85e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a380463 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a380463\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\">Pentest IoT:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2231b4f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"2231b4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Assessment of product robustness to known attacks:<\/b> the audit identifies weaknesses that an attacker could exploit, whether in hardware, software or the interface between the two. This makes it possible to anticipate potential attack vectors before the product is put on the market. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Improving security right from the design phase:<\/b> by providing precise technical feedback, IoT pentest enables designers to correct identified vulnerabilities (poor debug access management, lack of firmware signature verification, insecure storage, etc.) and integrate good security-by-design practices.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Protection of intellectual property and sensitive data:<\/b> pentesting helps prevent malicious actors from extracting firmware, hijacking equipment functionality, or accessing sensitive information embedded in the product.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Product enhancement for customers and partners:<\/b> a product tested and reinforced by a pentest can be presented as more reliable and secure, which is a competitive advantage in a market where cybersecurity is an increasingly decisive criterion.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78c2e41 e-flex e-con-boxed e-con e-parent\" data-id=\"78c2e41\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab1247 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"cab1247\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rely on a rigorous, proven approach\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62ff969 e-con-full e-flex e-con e-child\" data-id=\"62ff969\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a85f86d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a85f86d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b44798 elementor-widget elementor-widget-heading\" data-id=\"8b44798\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pentesting a workstation :<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74aad2e elementor-widget elementor-widget-text-editor\" data-id=\"74aad2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Workstation pentesting is always carried out in black box mode, as the customer has no technical information on the design of the hardware being audited. This is the scenario of a lost or stolen workstation. <\/p><p>To meet this requirement, a specific methodology was developed, as illustrated in the following diagram.<\/p><p>One of the main challenges of this type of audit is the risk of data destruction or loss.<\/p><p>Being in a black box, the auditors have no useful information on the equipment used or the location of the various components. The documentary research phase will help to remedy this. <\/p><p>However, the methodology also takes into account cases where no information is available, thus minimizing the risk of destruction, while ensuring a good level of analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d31530 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6d31530\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t\t\t\t\n\t\t\t\t<a\n\t\t\thref=\"\/wp-content\/uploads\/Schema1_demarche-synetis-scaled.jpg\" target=\"_blank\"\n\t\t\tclass=\"e-image-link-base\"\n\t\t\tdata-interaction-id=\"0634556\"\n\t\t>\n\t\t<img class=\"e-image-base e-0634556-21366f6\" \n\t\t\t\t\tdata-interaction-id=\"0634556\" \n\t\t \n\t\t data-e-type=\"widget\" data-id=\"0634556\" \n\t\t\t\t\t\t\t\t\tid=\"22224\"\n\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-scaled.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\twidth=\"2560\"\n\t\t\t\t\t\t\t\t\t\t\t\theight=\"835\"\n\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-scaled.jpg 2560w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-300x98.jpg 300w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-1024x334.jpg 1024w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-768x250.jpg 768w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-1536x501.jpg 1536w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema1_demarche-synetis-2048x668.jpg 2048w\"\n\t\t\t\t\t\t\t\t\t\t\t\talt=\"\"\n\t\t\t\t\t\t\/>\n\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0de0bba e-con-full e-flex e-con e-child\" data-id=\"0de0bba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1028dc3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1028dc3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t\t\t\t\n\t\t\t\t<a\n\t\t\thref=\"\/wp-content\/uploads\/Schema2_demarche-synetis-scaled.jpg\" target=\"_blank\"\n\t\t\tclass=\"e-image-link-base\"\n\t\t\tdata-interaction-id=\"f2d7f28\"\n\t\t>\n\t\t<img class=\"e-image-base e-f2d7f28-0d71b86\" \n\t\t\t\t\tdata-interaction-id=\"f2d7f28\" \n\t\t \n\t\t data-e-type=\"widget\" data-id=\"f2d7f28\"\n\t\t\t\t\t\t\t\t\tid=\"22225\"\n\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-scaled.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\twidth=\"2560\"\n\t\t\t\t\t\t\t\t\t\t\t\theight=\"705\"\n\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-scaled.jpg 2560w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-300x83.jpg 300w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-1024x282.jpg 1024w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-768x211.jpg 768w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-1536x423.jpg 1536w, https:\/\/www.synetis.com\/wp-content\/uploads\/Schema2_demarche-synetis-2048x564.jpg 2048w\"\n\t\t\t\t\t\t\t\t\t\t\t\talt=\"\"\n\t\t\t\t\t\t\/>\n\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08552e7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"08552e7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46afc56 elementor-widget elementor-widget-heading\" data-id=\"46afc56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Pentest IoT:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d66ab elementor-widget elementor-widget-text-editor\" data-id=\"74d66ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The audit can therefore be carried out in black, gray or white boxes, depending on the information shared.<\/p><p>However, the audit begins systematically in black box mode, in order to simulate the real conditions of an attack carried out without any prior knowledge of the hardware.<\/p><p>The methodology used differs slightly from that applied to substation pentesting. The diagram below illustrates the specific steps involved in an IoT audit. <\/p><p>Unlike substation pentesting, where only two outcomes are possible (total compromise or failure), IoT pentesting can result in a partial level of compromise.<\/p><p>For example, reading and analyzing the firmware may reveal sensitive information, without actually modifying the system&#8217;s behavior.<\/p><p>A total compromise is considered to have occurred when modified firmware can be injected and executed on the equipment, thus enabling it to bypass its main function.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d85b85 e-flex e-con-boxed e-con e-parent\" data-id=\"1d85b85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c32780 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4c32780\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hardware pentest feedback\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c333f12 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c333f12\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>If you&#8217;d like to find out more about how to carry out this type of intrusion test, you can read the article on a successful hardware intrusion test by Samuel Marrazzo and Louis Distel by clicking <a href=\"https:\/\/www.synetis.com\/en\/blog\/retour-sur-un-pentest-hardware-reussi\/\">here<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2132cd6 elementor-widget elementor-widget-menu-anchor\" data-id=\"2132cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contact-audit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e74b391 e-grid e-con-boxed e-con e-parent\" data-id=\"6e74b391\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3cbf5101 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3cbf5101\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b96f25 elementor-widget elementor-widget-deensimc-animated-word-roller\" data-id=\"52b96f25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"deensimc-animated-word-roller.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"infinite-rotation-main-wrapper\">\n\t\t\t<h2 class=\"deensimc-infinite-rotation-container\">\n\t\t\t\t\t\t\t\t\t<span class=\"deensimc-fixed-text deensimc-infinite-rotation-heading\">\n\t\t\t\t\t\tAre you planning an audit?\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t<div class=\"deensimc-text-rotator-container\">\n\t\t\t\t\t<div class=\"deensimc-vertical-scroll-track\"\n\t\t\t\t\t\tdata-total-text=\"7\"\n\t\t\t\t\t\tdata-rotation-delay=\"3\"\n\t\t\t\t\t\tdata-visible-word=\"1\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tPentest\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tArchitecture\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tConfiguration\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tRed Team\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSocial Engineering\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tOrganizational and Physical\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSource code\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/h2>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<noscript>\n\t\t\t<div class=\"deensimc-noscript-notice\" role=\"note\">\n\t\t\t\tThis section requires JavaScript to load properly. Please enable JavaScript in your browser and reload the page.\t\t\t<\/div>\n\t\t<\/noscript>\n\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35120bb9 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"35120bb9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12ed55b2 elementor-widget elementor-widget-hubspot-form\" data-id=\"12ed55b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hubspot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 26643307,\n\t\t\t\t\t\t\t\t\tformId: \"a4591422-7cbd-429d-8f24-693ff8ce4b4a\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1778687863000-2905089665\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1778687863000-2905089665\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hardware penetration testing (hardware Pentest) audits your electronic equipment to detect vulnerabilities by analyzing its physical components.<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":22574,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22206","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/comments?post=22206"}],"version-history":[{"count":1,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22206\/revisions"}],"predecessor-version":[{"id":22239,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22206\/revisions\/22239"}],"up":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22574"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=22206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}