Set Pentest Requirements

Now that you’ve defined an asset, it’s time to define requirements for the pentest.

Define what you want our pentesters to test.

When you set up a pentest through the UI, you’re going through the following stages of our pentest wizard:

  • Review the asset
  • Set pentest requirements
  • Add pentest details
  • Plan and scope the pentest

This section can help you set pentest requirements. In the Cobalt UI, you can define pentest requirements in the following screen:

Pentest Requirements

On this page of the UI, you can:

If you’re not sure what to include in the UI, follow the links associated with each bullet. If you’re experienced with defining pentests, fill out the page, and continue to Pentest Detail Requirements.

We use the penetration testing methodologies listed on the page. If you want to know more about each methodology, navigate to the page associated with your asset.

If you start at the top of the pentest requirements page, your next step is to specify a target.


Pentest Target

Define where our pentesters can find your asset.

Pentest Methodologies

An overview of available pentest methodologies.

Test Credentials

Your pentesters need dedicated accounts to test your systems.

Special Instructions

Every asset is unique. What do your pentesters need to know about it?

Technology Stack

Your pentesters need to know the technologies behind your asset.




Was this page helpful?

Yes No Create an Issue

Last modified October.10.2022