Define where our pentesters can find your asset.
Set Pentest Requirements
Define what you want our pentesters to test.
When you set up a pentest through the UI, you’re going through the following stages of our pentest wizard:
- Review the asset
- Set pentest requirements
- Add pentest details
- Plan and scope the pentest
This section can help you set pentest requirements. In the Cobalt UI, you can define pentest requirements in the following screen:
On this page of the UI, you can:
- Specify a Pentest Target.
- Define a Pentest Methodology, with detailed objectives. You can read about the objectives associated with each asset type.
- Include Test Credentials.
- Add special Instructions.
- Define the Technology Stack.
If you’re not sure what to include in the UI, follow the links associated with each bullet. If you’re experienced with defining pentests, fill out the page, and continue to Pentest Detail Requirements.
We use the penetration testing methodologies listed on the page. If you want to know more about each methodology, navigate to the page associated with your asset.
If you start at the top of the pentest requirements page, your next step is to specify a target.
An overview of available pentest methodologies.
Your pentesters need dedicated accounts to test your systems.
Every asset is unique. What do your pentesters need to know about it?
Your pentesters need to know the technologies behind your asset.
Last modified October.10.2022