Auth-Providers
With an auth provider, you can store access data of target systems to obtain more information. Access to the target system allows getting the operating system and installed software. Therefore, Hacktor can detect and validate more vulnerabilities (CVEs) than if only the publicly accessible information is available to it.
Use the search bar to display the desired entries.

Access data can be stored for the following services:
SSH (Secure Shell): Protocol for remote maintenance and administration of servers and clients, which is mainly used for Linux servers and clients.
WMI (Windows Management Instrumentation): Service for remote maintenance and administration of Windows servers and clients.
SNMP v1/v2/v3 (Simple Network Management Protocol): Protocol for monitoring and controlling network devices, which is mainly used for printers, switches or industrial installations.
Field Level Encryption
By implementing field-level encryption, sensitive fields are now individually encrypted, ensuring a much higher level of protection for your data. This encryption technology allows you to specifically secure certain data fields, which significantly minimizes potential security risks.
Learn how to set up Field Level Encryption in our guide.
Last updated
Was this helpful?