1:"$Sreact.fragment" 2:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"ViewportBoundary"] 3:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"MetadataBoundary"] 4:"$Sreact.suspense" 5:I[27201,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"IconMark"] 0:{"buildId":"SnQbk_Hk3Neu5-OQJ-O5Z","rsc":["$","$1","h",{"children":[null,["$","$L2",null,{"children":[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","2",{"name":"theme-color","content":"#030712"}]]}],["$","div",null,{"hidden":true,"children":["$","$L3",null,{"children":["$","$4",null,{"name":"Next.Metadata","children":[["$","title","0",{"children":"Services | Octagon Networks"}],["$","meta","1",{"name":"description","content":"Comprehensive cybersecurity services including penetration testing, red team operations, code review, and security training."}],["$","meta","2",{"name":"keywords","content":"cybersecurity,penetration testing,red team,vulnerability research,CVE,security"}],["$","link","3",{"rel":"icon","href":"/imgs/favicon-light-32.png","media":"(prefers-color-scheme: light)","sizes":"32x32","type":"image/png"}],["$","link","4",{"rel":"icon","href":"/imgs/favicon-dark-32.png","media":"(prefers-color-scheme: dark)","sizes":"32x32","type":"image/png"}],["$","link","5",{"rel":"apple-touch-icon","href":"/imgs/apple-touch-icon.png","sizes":"180x180"}],["$","$L5","6",{}]]}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],"loading":null,"isPartial":false}