Consult pentest results

Modified on Mon, 28 Aug, 2023 at 11:54 AM

Through this article, you will learn how to access your pentest data.


SUMMARY


Reviewing Pentest Results

What form does a pentest rake on the Portal?

A pentest is presented as an aggregate of information:

  • a managerial and technical summary, strengths, and the campaign scenario
  • the list of vulnerabilities
  • the evolution of the score
  • the list of action tickets (recommendations)
  • the list of assets within the scope
  • the list of users with access to the audit
  • a file-sharing space



Step 1 : Go to the Audits > My Audits menu and select the audit of interest

The My Audits page provides a summary list of audits accessible to you. (As a Manager, you will have access to all audits within your company, even if you have not been specifically added to the authorized user list.)


This page is located in the Audit menu, under the My Audits submenu.



Step 2 : Access Vulnerabilities in My Audit

After clicking on the audit of interest, you can view vulnerabilities identified by our consultants from the Vulnerabilities tab. This tab allows you to identify and track all vulnerabilities identified by XMCO.

  • By clicking on the title of a vulnerability, you will have a more detailed description of the vulnerability, including its severity, exploit complexity, and procedure.
  • All vulnerability proofs are stored at the end, in the file repository section.
  • Furthermore, each vulnerability is associated with one or more recommendation(s) (corresponding to the action plan, see Step 3)

It is possible to download vulnerabilities in PDF format.



Step 3 : Access the Action Plan for My Audit

After clicking on the audit of interest, you can view the recommendations to apply for correcting vulnerabilities from the Action Plan tab. This tab allows you to track all actions to be taken on your side that have been identified by XMCO.

  • By clicking on the title of a recommendation, you will have a more detailed description of the recommendation, including its priority, difficulty of correction, or even its impact on the audit score.

  • Each recommendation can be treated as a "support" ticket: its resolution will enable the certification of vulnerability correction or mitigation in the counter-audit process.

  • You can modify the status of each ticket as you wish: change its status, the assigned person, add comments, etc.

It is possible to download recommendations in PDF format.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article