Automated pentest
Only those who know their systems from all angles can provide all-encompassing protection.
So take the chance and look at your own IT from a hacker’s point of view now!

Over 10.000+ secured systems by hidden champions, SMEs and our partners.
Enginsight is the most comprehensive and simple security solution for all sizes of companies , Made in Germany.





With Enginsight you are always one step ahead
Only those who know their IT are able to react quickly and eliminate vulnerabilities before they can be exploited.

Get to know your systems better before attackers get ahead of you. Use this knowledge to effectively optimize security measuresand finally make their successes visible.

Save timeand costsfor an external service provider. The automatic pentest can be performed at any time and always knows the current status of known security vulnerabilities. So you always keep everything in view.

Perform as many pentests as you like, atno extra cost. Test your own security measures as often as you like for their effectiveness and benefit from a perfect vulnerability overview.

QSil AG, quartz glass manufacturer
Identify and eliminate IT vulnerabilities
Fix security gaps and risks before they become a problem.
All-around protection
Check IT from the inside and outside
Define individual goals. Select individual IP addresses and websites, work with IP ranges or access an automatically generated inventory. All devices with an IP address can thus be checked for their security status.
- Information gathering from a hacker's point of view
- Web-based attacks
- Password check with bruteforce
Continuous safety
Automate checks and extend them manually
Define which checks and attacks should be performed and extend the pentest with your own password lists or checks. Configure a recurring execution. This is how you establish risk management as an ongoing process.
- Network vulnerability scan (CVE scan)
- Specific attacks on detected services
- Attacks extensible through custom scripts
At a glance
Increasing safety thanks to audit reports
See at a glance how secure you are positioned and where the most urgent need for action is. The comparison with previous audits reveals how successful your previous measures for hardening your IT systems already were.
- Clear audit reports
- Automated vulnerability analysis
- Concrete recommendations for action
Pentesting is a good way to check your own security measures for success. However, it does not replace the continuous protection of their systems and is therefore a good complement to other functions.
Technical details
Would you like to know a little more? Then you are exactly right here! Find out what Enginsight does for you in detail when it comes to automated pentesting.
Information Gathering
During the information gathering process, Hacktor creates a comprehensive footprint of the target systems. Footprinting is the collection of information that is used for subsequent hacking attacks. Real hackers also create a footprint in the first step to sound out promising attack vectors.
- Ports
- HTTP-Header
- Web applications
- SNMP v1/v2/v3
- mDNS
- SSH
- VNC
- RDP
- Telnet
CVE-Scanning
To detect security vulnerabilities in deployed software, Hacktor checks all systems for Common Vulnerabilities and Exposures (CVE). Hacktor examines applications accessible from the outside completely automatically. In order to examine even more software and improve validity, access data can be optionally stored.
- Ports
- HTTP-Header
- Web applications
- SNMP v1/v2/v3
- SSH
- WMI
Service Bruteforce
By trying usernames and password combinations en masse, Hacktor tries to penetrate the system. If he succeeds, he will try to penetrate the system even deeper. Use the Enginsight password list or store your own authentication data.
- SSH
- Telnet
- RDP
- MySQL
- Mongo DB
- MS SQL
- Redis
- Maria DB
- PostgreSQL
- HTTP Basic Auth
- HTTP Web Forms
- FTP
- SNMP
- SMB
Service Discovery
In the discovery phase, Hacktor tests the discovered services for specific, common vulnerabilities caused by incorrect configuration. Authentication procedures, encryption of connections, and execution and access rights, among other things, are put under the microscope.
- MongoDB
- MySQL
- HTTP
- HTTP-Header
- SSL/TLS
- SMTP
- SSH
- Telnet
- DNS
- FTP
- LDAP
- SMB
- SNMP v1/v2/v3
Custom Scripts
Custom scripts allow advanced users to extend the included test set. Conceivable application scenarios for custom pentest scripts are countless and depend on individual requirements. For example, checks can be stored for unusual systems that are of great importance for the infrastructure under test, or it is possible to search specifically for undesirable or obsolete configurations.
- Python
- Ruby
- Bash