<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://pentests.nl/pentest-begrippen/idor/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/offensive-entra-id-azure-ad-and-hybrid-ad-security-outsider-security-review/</loc><lastmod>2025-07-30T08:44:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/the-wifi-pineapple-basic-usage/</loc><lastmod>2025-07-16T09:43:40+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/tpm%e2%80%91sniffing-with-saleae-logic-analyzer/</loc><lastmod>2025-06-17T12:05:30+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/keycroc-hak5-tutorial-wat-is-het-en-hoe-werkt-het/</loc><lastmod>2025-07-09T10:20:37+00:00</lastmod></url><url><loc>https://pentests.nl/contact/</loc><lastmod>2025-03-18T10:45:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/certified-azure-red-team-expert-carte-review/</loc><lastmod>2025-05-06T07:43:14+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/oscp-offensive-security-certified-professional-uitgelegd/</loc><lastmod>2025-04-30T11:00:28+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/smb-misconfiguraties-hoe-smb-veilig-instellen/</loc><lastmod>2024-10-31T13:38:39+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/ethical-hacker-inhuren/</loc><lastmod>2024-07-29T06:47:55+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/kwetsbaarheidsscan-uitvoeren-het-wat-en-waarom/</loc><lastmod>2024-04-18T11:19:22+00:00</lastmod></url><url><loc>https://pentests.nl/cursus-ethical-hacking-training-voor-bedrijven-2/</loc><lastmod>2024-04-22T11:37:54+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/qr-codes-het-onverwachte-wapen-in-device-code-phishing/</loc><lastmod>2024-02-13T09:33:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/cross-site-scripting-wat-is-het-en-hoe-te-voorkomen/</loc><lastmod>2024-01-18T10:54:16+00:00</lastmod></url><url><loc>https://pentests.nl/</loc><lastmod>2024-01-12T10:24:56+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/azure-pentest-uitvoeren/wat-is-een-azure-resource-pentest/</loc><lastmod>2024-01-11T12:24:01+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/azure-pentest-uitvoeren/wat-is-een-azure-ad-pentest/</loc><lastmod>2024-01-10T15:11:15+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/azure-pentest-uitvoeren/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/azure-pentest-uitvoeren/wat-is-een-microsoft-365-pentest/</loc><lastmod>2024-01-11T12:47:40+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/cors-het-belang-van-cross-origin-resource-sharing/</loc><lastmod>2024-01-04T08:49:10+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/cybersecurity-amsterdam/</loc><lastmod>2023-12-19T13:04:59+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/security-headers-het-wat-en-waarom/</loc><lastmod>2025-05-06T15:00:22+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/verschil-ntlm-ntlmv2-lm/</loc><lastmod>2023-10-12T09:24:21+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/metadata/</loc><lastmod>2023-08-22T08:40:59+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/server-header-verwijderen/</loc><lastmod>2023-08-16T08:54:54+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/nis2-pentest-het-wat-en-waarom/</loc><lastmod>2023-09-15T12:25:04+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/</loc><lastmod>2023-07-27T11:41:22+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/cve-2023-28130-command-injection-in-check-point-gaia-portal/</loc><lastmod>2023-07-31T08:31:59+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/certified-az-red-team-professional-cartp-review/</loc><lastmod>2023-07-27T06:55:33+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/pci-dss-pentest-laten-uitvoeren/</loc><lastmod>2023-07-27T11:28:24+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/sql-injectie/</loc><lastmod>2023-07-19T15:08:35+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/white-box-pentest-uitvoeren-de-voor-en-nadelen/</loc><lastmod>2023-04-18T09:07:05+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/grey-box-pentest-uitvoeren-de-voor-en-nadelen/</loc><lastmod>2023-04-18T08:16:42+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/black-box-pentest-uitvoeren-de-voor-en-nadelen/</loc><lastmod>2023-04-18T08:15:06+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/cve-2023-27532-kwetsbaarheid-in-veeam-backup-replication/</loc><lastmod>2023-07-31T08:35:11+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/iso-27001-pentest/</loc><lastmod>2023-03-21T09:13:02+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/access-control/</loc><lastmod>2023-02-08T12:51:54+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/honeypot/</loc><lastmod>2023-02-08T12:44:18+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/encryptie/</loc><lastmod>2023-02-08T12:32:19+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/infrastructuur-pentest/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/pentest-kosten/</loc><lastmod>2023-03-22T13:57:42+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/botnet/</loc><lastmod>2023-08-16T08:57:21+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/malware/</loc><lastmod>2023-02-08T12:48:06+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/spam/</loc><lastmod>2023-02-08T12:48:57+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/antivirus-software/</loc><lastmod>2023-02-08T12:53:24+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/web-application-firewall/</loc><lastmod>2022-12-19T11:34:39+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/firewall/</loc><lastmod>2022-12-19T10:52:43+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/pass-the-hash/</loc><lastmod>2022-12-19T10:14:47+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/risico-oude-wachtwoorden-administrator/</loc><lastmod>2023-02-09T10:10:13+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/emotet-wat-is-het-en-hoe-ertegen-te-beschermen/</loc><lastmod>2023-02-09T10:10:29+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/pentest-bedrijven-nederland/</loc><lastmod>2023-02-09T10:08:33+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/pentest-ransomware-voorkomen-penetratietest/</loc><lastmod>2022-11-04T08:53:29+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/responder-smb-signing-relay/</loc><lastmod>2022-10-27T11:16:41+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/csp-content-security-policy/</loc><lastmod>2022-08-26T12:26:04+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/api-pentest-uitvoeren/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/pentest-uitvoeren/</loc><lastmod>2022-10-26T08:55:33+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/stored-xss-in-bigbluebutton/</loc><lastmod>2023-07-31T08:35:24+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/win-een-phishing-simulatie/</loc><lastmod>2022-10-27T10:47:57+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/</loc><lastmod>2022-06-13T11:38:31+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/wat-is-een-bio-ensia-penetratietest/</loc><lastmod>2023-03-22T14:12:25+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/dark-web/</loc><lastmod>2022-05-18T09:31:54+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/zero-trust/</loc><lastmod>2022-05-18T09:59:31+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/dmz/</loc><lastmod>2022-05-18T09:39:13+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/end-of-life/</loc><lastmod>2022-05-18T10:04:38+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/ewpt-ewptx/</loc><lastmod>2022-11-01T09:28:19+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/greybox/</loc><lastmod>2022-05-18T09:55:12+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/lateral-movement/</loc><lastmod>2022-05-18T10:04:39+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/mfa/</loc><lastmod>2022-05-18T10:06:11+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/osce/</loc><lastmod>2022-05-18T09:40:53+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/oscp/</loc><lastmod>2025-02-25T09:09:17+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/osint/</loc><lastmod>2022-05-18T09:50:30+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/ransomware/</loc><lastmod>2022-05-18T09:58:11+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/red-team/</loc><lastmod>2022-05-18T09:58:32+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/responsible-disclosure/</loc><lastmod>2022-05-18T10:05:51+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/social-engineering/</loc><lastmod>2022-05-18T10:05:28+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/spf/</loc><lastmod>2022-05-18T09:40:19+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/sql-injectie/</loc><lastmod>2022-05-18T09:59:10+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/whitebox/</loc><lastmod>2022-05-18T09:54:10+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/dmarc/</loc><lastmod>2022-05-18T09:50:50+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/dkim/</loc><lastmod>2022-05-18T09:32:49+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/ddos/</loc><lastmod>2022-05-18T09:32:46+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/vulnerability-scan/</loc><lastmod>2022-05-18T10:05:28+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/cve/</loc><lastmod>2022-05-18T09:31:23+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/cvd/</loc><lastmod>2022-05-18T09:30:53+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/cryptografie/</loc><lastmod>2022-05-18T09:29:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/xss/</loc><lastmod>2022-11-01T09:29:11+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/csrf/</loc><lastmod>2022-11-01T09:25:53+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/cissp/</loc><lastmod>2022-05-18T09:23:48+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/ciso/</loc><lastmod>2022-05-18T09:17:18+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/cism/</loc><lastmod>2022-05-18T09:16:15+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/c2-server/</loc><lastmod>2022-05-18T09:16:42+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/buffer-overflow/</loc><lastmod>2022-07-13T11:05:15+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/blackhat-hacker/</loc><lastmod>2022-05-18T09:10:43+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/blackbox/</loc><lastmod>2022-05-18T09:10:16+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/backdoor/</loc><lastmod>2022-05-18T09:08:55+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/awareness/</loc><lastmod>2022-05-18T09:09:34+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/avg/</loc><lastmod>2022-05-18T08:52:26+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/auditor/</loc><lastmod>2022-05-18T08:51:31+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/attack-surface/</loc><lastmod>2022-05-18T08:47:53+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/</loc><lastmod>2022-05-13T07:42:45+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/apt/</loc><lastmod>2022-05-18T08:46:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/adware/</loc><lastmod>2022-05-18T08:44:21+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-begrippen/2fa/</loc><lastmod>2022-11-01T09:23:36+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/zip-wachtwoord-kraken-conti-locker/</loc><lastmod>2022-10-27T10:47:54+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/wifi-hacken-met-wifite2/</loc><lastmod>2022-10-27T10:47:51+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/wat-is-kali-linux/</loc><lastmod>2023-02-09T10:11:24+00:00</lastmod></url><url><loc>https://pentests.nl/penetratietest/</loc><lastmod>2022-10-26T08:53:19+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/norea-digid-pentest-audit/</loc><lastmod>2023-02-09T10:00:15+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/waarom-een-pentest-van-pentests-nl/</loc><lastmod>2023-08-22T08:21:51+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/wat-is-burp-suite/</loc><lastmod>2022-10-27T10:47:45+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/webapplicatie-pentest-website/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/mobiele-app-pentest/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/attack-surface-pentest-exposure-onderzoek/</loc><lastmod>2023-02-09T10:05:05+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/bedrijfsnetwerk-pentest-infrastructuur/</loc><lastmod>2026-05-18T10:00:00+00:00</lastmod></url><url><loc>https://pentests.nl/pentest/wat-is-een-pentest/</loc><lastmod>2023-04-18T08:24:10+00:00</lastmod></url><url><loc>https://pentests.nl/pentest-blog/wat-is-seccubus/</loc><lastmod>2022-10-27T10:46:49+00:00</lastmod></url></urlset>