{"version":"1.0","provider_name":"Business Yield Technology","provider_url":"https:\/\/businessyield.com\/tech","title":"PENTESTERS: What Is It and Who are Pentester?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SBFvULq7WX\"><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/pentesters\/\">PENTESTERS: What Is It and Who are Pentester?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/businessyield.com\/tech\/cyber-security\/pentesters\/embed\/#?secret=SBFvULq7WX\" width=\"600\" height=\"338\" title=\"&#8220;PENTESTERS: What Is It and Who are Pentester?&#8221; &#8212; Business Yield Technology\" data-secret=\"SBFvULq7WX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/12\/Pentesters.jpg","thumbnail_width":900,"thumbnail_height":600,"description":"Penetration testers, are cybersecurity experts who specialize in discovering flaws and vulnerabilities in computer systems, networks, and applications. In this blog article, we will delve into the world of pentesters in cyber security, investigating their function, the frameworks they use, the importance of Python in their toolbox, the typical salary they command, and the path to becoming a pentester."}