{"id":387772,"date":"2023-07-07T13:50:29","date_gmt":"2023-07-07T13:50:29","guid":{"rendered":"https:\/\/webkul.com\/blog\/?p=387772"},"modified":"2024-07-01T09:59:41","modified_gmt":"2024-07-01T09:59:41","slug":"how-to-perform-penetration-testing-in-wordpress","status":"publish","type":"post","link":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/","title":{"rendered":"How to Perform Penetration Testing in WordPress?"},"content":{"rendered":"\n<p>Penetration testing (pen test) is an authorized simulated attack performed on a computer system to evaluate its security. <\/p>\n\n\n\n<p>Penetration testers use tools, techniques, and processes as attackers to find and demonstrate the impacts of weaknesses in a system. In today&#8217;s digital landscape, securing websites is of utmost importance, especially for popular platforms like WordPress.<\/p>\n\n\n\n<p>As the most widely used content management system (CMS), WordPress is a prime target for hackers. Performing penetration testing is an essential step to identify vulnerabilities and fortify the security of your WordPress website. <\/p>\n\n\n\n<p>In this blog post, we will guide you through the process of conducting a  penetration test in WordPress, helping to protect the site from potential threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Impact of Penetration Testing<\/h2>\n\n\n\n<p>In a penetration test, the tester will exploit vulnerabilities in your website and systems by breaking security controls. During organized attacks, the tester may accidentally break something important, which may lead to a system outage. <\/p>\n\n\n\n<p>These system outages can happen for a number of reasons, here are two of the most common reasons why they may occur during a penetration test:<\/p>\n\n\n\n<p><strong>Rashness<\/strong> &#8211; This may not be intentional but due to inexperience or carelessness. On one hand, an experienced tester is familiar with the systems they are testing and the tools they are using.<\/p>\n\n\n\n<p>On the other hand, an inexperienced tester may misuse their tools which could lead to a system break.&nbsp;<\/p>\n\n\n\n<p><strong>Unexpected circumstances<\/strong> &#8211;  System outages can sometimes occur regardless of the tester&#8217;s expertise, whether due to software faults in an application or unexpected events such as the misconfiguration of a network device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of Penetration Testing<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To find &amp; fix vulnerabilities before hackers exploit them.<\/li>\n\n\n\n<li>Comply with industry regulations or standards like PCI DSS or HIPAA<\/li>\n\n\n\n<li>To improve the overall security posture of your organization<\/li>\n\n\n\n<li>Secure your own and your customer&#8217;s sensitive data stored on your site<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Some Tools to Perform Penetration Testing<\/h2>\n\n\n\n<p><strong>Astra Pentest \u2013<\/strong>&nbsp;Astra Pentest is a powerful, yet easy-to-use vulnerability scanning and both manual and&nbsp;automated pen testing&nbsp;tool that can scan your WordPress site for vulnerabilities in minutes.<\/p>\n\n\n\n<p> It\u2019s also the only pen-testing tool on the market that offers both automated scanning and manual penetration testing capabilities.<\/p>\n\n\n\n<p><strong>WPScan \u2013&nbsp;<\/strong>Novice users and more experienced pen testers use it. This is possible due to its detailed documentation. <\/p>\n\n\n\n<p>It\u2019s perfect for finding low-hanging fruit like hidden settings pages that are accessible without authentication, brute forcing usernames and passwords, and much more.<\/p>\n\n\n\n<p><strong>Burp Suite  \u2013&nbsp;<\/strong>This paid tool offers real-time vulnerability detection and goes above and beyond what other tools can do by testing against all potential vulnerabilities. It\u2019s perfect for organizations who want to ensure their website is secure from hackers.<\/p>\n\n\n\n<p>For more details regarding Burp Suite visit <a href=\"https:\/\/portswigger.net\/burp\/documentation\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Burp Suite<\/a>.<\/p>\n\n\n\n<p>You may also <a href=\"https:\/\/webkul.com\/hire-woocommerce-developers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hire WordPress Developers<\/a> for your project work.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1200\" height=\"619\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png\" alt=\"penetration-testing\" class=\"wp-image-389017\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png 1200w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-300x155.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-250x129.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-768x396.png 768w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing.png 1362w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Penetration testing is an important measure for any WordPress site owner. It helps you to identify vulnerabilities and improve the security of your site to protect against hackers, data theft, and other malicious attacks. <\/p>\n\n\n\n<p>If you are concerned about your site&#8217;s security, it might be time to call in a professional penetration tester today<\/p>\n\n\n\n<p>You may also visit <a href=\"https:\/\/webkul.com\/blog\/how-to-test-protect-woocommerce-plugins-xss-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">XSS Vulnerabilities<\/a> regarding test and protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Support<\/h2>\n\n\n\n<p>That is all for this dev article on how to perform penetration testing in WordPress. For any technical assistance, please\u00a0<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\" target=\"_blank\" rel=\"noreferrer noopener\">raise a ticket<\/a>\u00a0or reach us by mail at\u00a0<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">support@webkul.com<\/a><\/p>\n\n\n\n<p>Find the list of <a href=\"https:\/\/store.webkul.com\/woocommerce-plugins\/WordPress.html\" target=\"_blank\" rel=\"noreferrer noopener\">WordPress plugins<\/a> to add more features to your website. You may also <a href=\"https:\/\/webkul.com\/hire-woocommerce-developers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hire WordPress Developers<\/a> for your project work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration testing (pen test) is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use tools, techniques, and processes as attackers to find and demonstrate the impacts of weaknesses in a system. In today&#8217;s digital landscape, securing websites is of utmost importance, especially for popular platforms like WordPress. As <a href=\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":507,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,1260],"tags":[14481,14480,14479,3250,1258],"class_list":["post-387772","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-wordpress","tag-penetration","tag-penetration-testing","tag-penetration-testing-wordpress","tag-testing","tag-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Perform Penetration Testing in WordPress?<\/title>\n<meta name=\"description\" content=\"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Perform Penetration Testing in WordPress?\" \/>\n<meta property=\"og:description\" content=\"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"Webkul Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webkul\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-07T13:50:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-01T09:59:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png\" \/>\n<meta name=\"author\" content=\"Jitendra Kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webkul\" \/>\n<meta name=\"twitter:site\" content=\"@webkul\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jitendra Kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\"},\"author\":{\"name\":\"Jitendra Kumar\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/99dc56ae952ad7fe9d2c53c9b7073da0\"},\"headline\":\"How to Perform Penetration Testing in WordPress?\",\"datePublished\":\"2023-07-07T13:50:29+00:00\",\"dateModified\":\"2024-07-01T09:59:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\"},\"wordCount\":597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png\",\"keywords\":[\"penetration\",\"penetration testing\",\"penetration testing wordpress\",\"testing\",\"wordpress\"],\"articleSection\":{\"1\":\"WordPress\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\",\"url\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\",\"name\":\"How to Perform Penetration Testing in WordPress?\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png\",\"datePublished\":\"2023-07-07T13:50:29+00:00\",\"dateModified\":\"2024-07-01T09:59:41+00:00\",\"description\":\"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.\",\"breadcrumb\":{\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing.png\",\"width\":1362,\"height\":703,\"caption\":\"penetration-testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Perform Penetration Testing in WordPress?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webkul.com\/blog\/#website\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"name\":\"Webkul Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webkul.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webkul.com\/blog\/#organization\",\"name\":\"WebKul Software Private Limited\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"width\":380,\"height\":380,\"caption\":\"WebKul Software Private Limited\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webkul\/\",\"https:\/\/x.com\/webkul\",\"https:\/\/www.instagram.com\/webkul\/\",\"https:\/\/www.linkedin.com\/company\/webkul\",\"https:\/\/www.youtube.com\/user\/webkul\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/99dc56ae952ad7fe9d2c53c9b7073da0\",\"name\":\"Jitendra Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c8d4de619d7c3b4a35dde558fa19cedea3490169ff972780a7f0ecc335024a9?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c8d4de619d7c3b4a35dde558fa19cedea3490169ff972780a7f0ecc335024a9?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"caption\":\"Jitendra Kumar\"},\"url\":\"https:\/\/webkul.com\/blog\/author\/jitendrakr-qa904\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Perform Penetration Testing in WordPress?","description":"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/","og_locale":"en_US","og_type":"article","og_title":"How to Perform Penetration Testing in WordPress?","og_description":"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.","og_url":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/","og_site_name":"Webkul Blog","article_publisher":"https:\/\/www.facebook.com\/webkul\/","article_published_time":"2023-07-07T13:50:29+00:00","article_modified_time":"2024-07-01T09:59:41+00:00","og_image":[{"url":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png","type":"","width":"","height":""}],"author":"Jitendra Kumar","twitter_card":"summary_large_image","twitter_creator":"@webkul","twitter_site":"@webkul","twitter_misc":{"Written by":"Jitendra Kumar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#article","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/"},"author":{"name":"Jitendra Kumar","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/99dc56ae952ad7fe9d2c53c9b7073da0"},"headline":"How to Perform Penetration Testing in WordPress?","datePublished":"2023-07-07T13:50:29+00:00","dateModified":"2024-07-01T09:59:41+00:00","mainEntityOfPage":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/"},"wordCount":597,"commentCount":0,"publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"image":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png","keywords":["penetration","penetration testing","penetration testing wordpress","testing","wordpress"],"articleSection":{"1":"WordPress"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/","url":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/","name":"How to Perform Penetration Testing in WordPress?","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage"},"image":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing-1200x619.png","datePublished":"2023-07-07T13:50:29+00:00","dateModified":"2024-07-01T09:59:41+00:00","description":"Penetration testing is an simulated attack performed on computer system to evaluate its security. Testers use the some tools and techniques.","breadcrumb":{"@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#primaryimage","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2023\/06\/penetration-testing.png","width":1362,"height":703,"caption":"penetration-testing"},{"@type":"BreadcrumbList","@id":"https:\/\/webkul.com\/blog\/how-to-perform-penetration-testing-in-wordpress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Perform Penetration Testing in WordPress?"}]},{"@type":"WebSite","@id":"https:\/\/webkul.com\/blog\/#website","url":"https:\/\/webkul.com\/blog\/","name":"Webkul Blog","description":"","publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webkul.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webkul.com\/blog\/#organization","name":"WebKul Software Private Limited","url":"https:\/\/webkul.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","width":380,"height":380,"caption":"WebKul Software Private Limited"},"image":{"@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webkul\/","https:\/\/x.com\/webkul","https:\/\/www.instagram.com\/webkul\/","https:\/\/www.linkedin.com\/company\/webkul","https:\/\/www.youtube.com\/user\/webkul\/"]},{"@type":"Person","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/99dc56ae952ad7fe9d2c53c9b7073da0","name":"Jitendra Kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c8d4de619d7c3b4a35dde558fa19cedea3490169ff972780a7f0ecc335024a9?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c8d4de619d7c3b4a35dde558fa19cedea3490169ff972780a7f0ecc335024a9?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","caption":"Jitendra Kumar"},"url":"https:\/\/webkul.com\/blog\/author\/jitendrakr-qa904\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/387772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/users\/507"}],"replies":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/comments?post=387772"}],"version-history":[{"count":36,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/387772\/revisions"}],"predecessor-version":[{"id":450457,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/387772\/revisions\/450457"}],"wp:attachment":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/media?parent=387772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/categories?post=387772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/tags?post=387772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}