With an auth provider, you can store access data of target systems to obtain more information. Access to the target system allows getting the operating system and installed software. Therefore, Hacktor can detect and validate more vulnerabilities (CVEs) than if only the publicly accessible information is available to it.

Use the search bar to display the desired entries.

Access data can be stored for the following services:

  • SSH (Secure Shell): Protocol for remote maintenance and administration of servers and clients, which is mainly used for Linux servers and clients.

  • WMI (Windows Management Instrumentation): Service for remote maintenance and administration of Windows servers and clients.

  • SNMP v1/v2/v3 (Simple Network Management Protocol): Protocol for monitoring and controlling network devices, which is mainly used for printers, switches or industrial installations.

Field Level Encryption

By implementing field-level encryption, sensitive fields are now individually encrypted, ensuring a much higher level of protection for your data. This encryption technology allows you to specifically secure certain data fields, which significantly minimizes potential security risks.

Learn how to set up Field Level Encryption in our guide.

For servers and clients running a version of Windows or Linux, we still recommend installing an Enginsight Pulsar Agent to monitor vulnerabilities from the inside. The scope and validity of the results of the CVE scan from the inside are superior to the hacktor scan, even with the auth provider stored. In addition, the CVE scan with Pulsar agent installed allows more convenient administration and is preferable from a security point of view, since no credentials have to be stored or accesses enabled.

Last updated