ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page
  • Create Target System
  • Specify IP ranges

Was this helpful?

  1. Operation
  2. Platform
  3. Penetration Testing (Hacktor)

Target Groups

PreviousAudit DefinitionsNextAuth-Providers

Last updated 1 year ago

Was this helpful?

A Target Group is one or more targets on which a pentest can be applied. These can be concrete IP addresses, the detected Asset Discovery of a Watchdog or Endpoints. After you have defined a Target Group, you can create an and start the penetration test.

Use the search bar to display the desired entries.

Create Target System

To create a Target Group, click 'Add Target Group' in the top right corner. Select a meaningful name and a description that sufficiently describes the targets. After that you can either manually add IP addresses, specify targets from one of your Watchdogs or select created endpoints. Then click on 'Add Target Group' to define a target for the Hacktor.

A maximum of 2048 targets (IP addresses) can be scanned in a single audit, regardless of whether the targets are reachable or not. If you start an audit on a target system that contains more than 2048 IP addresses, the remaining IP addresses are discarded and only the first 2048 are processed.

Specify IP ranges

In principle, you can also specify IP ranges.

Check first whether it does not make more sense to use the watchdog's inventory as the basis for the pentest. A pentest over an IP range takes much longer, since the hacktor pings every IP address. You will also get many offline targets in the results, since in most cases only small parts of the network are used.

Also, note that a maximum of 2048 IP addresses are scanned in a common audit, regardless of whether the targets are reachable or not. If you start an audit on a target system that contains more than 2048 IP addresses, the remaining IP addresses are discarded and only the first 2048 are processed.

Syntax
Example
Description

[] . [] . [] . [] / []

192.168.178.0/30

Specify a subnet mask.

[] . [] . [] . [] - []

192.168.178.12-16

Specify a sequence.

[] . [] . [] . [] , []

192.168.178.30,45

Specify a series.

[] . [] . [] , [] . [] - []

192.168.5,8.10-12

Combine series and sequence.

Audit Definition