# Penetration Testing (Hacktor)

## What happens during a penetration test by Enginsight?

Test individual systems or entire IT infrastructures from a hacker's perspective in a completely automated way. You can either perform the pentest on public IP addresses from the outside or from inside the network.

Which attack vectors are supported by Enginsight's penetration test, [learn more here.](https://docs.enginsight.com/docs/master/technical-details/range-of-functions-pentest)

## Table of contents

* [**Run pentest**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/run-pentest)\
  Step-by-step instructions for running an automated pentest with Enginsight.
* [**Audits**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/audits)\
  View results of the penetration test: [Summary](https://docs.enginsight.com/docs/master/operation/platform/audits#audit-summary), [Details](https://docs.enginsight.com/docs/master/operation/platform/audits#audit-details), [PDF-Reports](https://docs.enginsight.com/docs/master/operation/platform/audits#pdf-reports).
* [**Audit Definitons**<br>](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/templates)Templates for standardized pentest: [Scheduled execution](https://docs.enginsight.com/docs/master/operation/platform/templates#recurring-execution), choose [Attacks](https://docs.enginsight.com/docs/master/operation/platform/templates#advanced-settings), own bruteforce [password list](https://docs.enginsight.com/docs/master/operation/platform/templates#own-password-list).
* [**Target Groups**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/target-groups)\
  Target systems under attack: Asset inventory, endpoints, IP addresses.
* [**Auth-Providers**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/auth-providers)\
  Provide access data of target systems to be able to get more information.
* [**Hacktor**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/hacktor)\
  Software component to execute pentest: [Install](https://docs.enginsight.com/docs/master/operation/platform/hacktor#create-hacktor), [Configure](https://docs.enginsight.com/docs/master/operation/platform/hacktor#configuring-the-hacktor), get [logs](https://docs.enginsight.com/docs/master/operation/platform/hacktor#get-logs).
* [**Custom Scripts**](https://docs.enginsight.com/docs/master/operation/platform/penetration-testing/custom-scripts)\
  Extend Pentest with your own scripts.
