The Pentest Details provides a comprehensive view of a specific manual pentest, covering its progress, vulnerabilities, details, and key metrics.

Once you start a pentest on your target, understanding the details of the pentest becomes crucial. These details provide insights into vulnerabilities discovered, testing and actionable findings that help strengthen your organization's security posture. This article aims to break down each section of the page to ensure you can utilize the information on the Pentest Details Page to manage your pentest assessments effectively.

What are available actions on pentest detail?

There are 3 main actions available on the pentest details page:

  1. Request Re-Scan: You can request a re-scan for a pentest by clicking on the “Request a Re-Scan” button. This will open the re-scan flow.

|| Note: A couple of things to ensure before requesting a rescan

  1. Reports: You can generate a report summary for a pentest by clicking on the “Reports” button. This will navigate you to the reports page

  2. Get Certificate: After a successful Pentest, you can generate a certificate for it by clicking on the Get Certificate button. The validity of the certificate is 180 days.

You will also find 3 key metrics on this section:

Tracking the Progress of the Pentest

To track the progress of a pentest, on the right side, you'll find the Progress widget. This shows the current stage of the pentest with an estimated time of arrival (ETA).

The progress bar provides a visual indication of the pentest status, covering stages such as:

How to improve your security posture with grades?

Understanding the vulnerability severity heat map

|| Each cell in the heatmap represents the count of vulnerabilities for a specific combination of status and severity, you can view this information by hovering over a cell of the heatmap

Where to view the reported vulnerabilities during the pentest?

To understand more about the detailed breakdown of the vulnerabilities statuses and table row, read here. You can also combine power of filters and tables to quickly filter our vulnerabilities that you’re looking for.