ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Policies
        • Plugins
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page

Was this helpful?

  1. Operation
  2. Platform
  3. Penetration Testing (Hacktor)

Run pentest

PreviousPenetration Testing (Hacktor)NextAudits

Last updated 1 year ago

Was this helpful?

  1. To perform an automated pentest, the software component must first be installed in the corresponding network segment on a Linux system. For this select Environments → Hacktors → 'Add hacktor' (above right) and follow the instructions of the platform.

  2. The second step is to define a . To create a Target Group, click on the menu item Target Groups under and on 'Add Target Group' in the upper right corner. Enter a name and a description. Click on 'Add Target Group' to save the Target Group.

  3. In a third step, you use a to define which hacktor should attack which Target Group. For this purpose you select 'Create Template' under Templates in the upper right corner. Enter a name and a description. The option 'Recurring execution' allows you to plan future executions. Via 'Advanced Settings' you can switch on bruteforce tests. To add the template, click on the button 'Create Template'.

  4. From the overview of the created templates, you can start the penetration test. Simply press 'Start scan'.

  5. In the you can view the results of the pentest performed.

Please note that a pentest may temporarily affect the availability of your system! You are only allowed to perform a pentest on your own systems. Violations can result in legal consequences.

Hacktor
Target Group
Audit Definiton
Audit Report