Penetration Testing (Hacktor)
What happens during a penetration test by Enginsight?
Test individual systems or entire IT infrastructures from a hacker's perspective in a completely automated way. You can either perform the pentest on public IP addresses from the outside or from inside the network.
Which attack vectors are supported by Enginsight's penetration test, learn more here.
Table of contents
Run pentest Step-by-step instructions for running an automated pentest with Enginsight.
Audits View results of the penetration test: Summary, Details, PDF-Reports.
Audit Definitons Templates for standardized pentest: Scheduled execution, choose Attacks, own bruteforce password list.
Target Groups Target systems under attack: Asset inventory, endpoints, IP addresses.
Auth-Providers Provide access data of target systems to be able to get more information.
Custom Scripts Extend Pentest with your own scripts.
Last updated