Sign up for a (15) day unlimited evaluation of the PENTESTON® security vulnerability assessment workbench used by individuals, businesses and services providers worldwide.  After eligibility verification we will provide you with two items, access to the researcher platform and a benchmark report of your exposure broken down by multiple categories including;


Web Application Security Score

  • Clickjacking, Cross Frame Scripting (XFS), and Cross Site Scripting (XSS) vulnerabilities
  • Vulnerable and misconfigured cookies
  • Identified booter shells
  • SQL & Blind SQL injection vulnerabilities
  • Directory traversal vulnerabilities
Network Security Score
  • Exposed network services, software versions, ports, and associated vulnerabilities 
  • SSH encryption strengths and practices 
  • SSL certificate status, encryption and cipher strengths
Endpoint Security Score
  • Metadata related to:
    • Operating systems
    • Web browsers
    • Active plug-ins
IP Reputation Score
  • Peer-to-peer (P2P) activity
  • Tor exit and intermediary nodes
  • Malware duration behavior
  • Historical behavior of malware (last 24 hours, last 30 days, last 365 Days)
Social Engineering Score
  • Social network data
  • Public data feeds
  • Corporate email address attribution 
  • Employee satisfaction 
  • Insecure security questions
Hacker Chatter Score
  • Hacker forums
  • IRC channels
  • Social network conversations
  • Hacked news mentions
  • Defacement mentions
DNS Health Score
  • Proper DNS setup
  • Sender Policy Framework (SPF) 
  • DKIM Configuration 
  • DNS hostnames 
  • DNS records
Cubit Score
  • Blacklisted databases
  • Spam activity
  • Exposed subdomains
  • WHOIS configurations
Patching Cadence
  • Exposed endpoint vulnerabilities (CVEs)
  • Insecure and outdated software, hardware, services, applications, and operating systems
  • Time between patch release and patch application
  • End of Life/Service products
Password Exposure
  • Exposed data leaks
  • Keylogger dumps
  • Database dumps
  • Public and private hacker chatter sources

The PENTESTON® human orchestration platform for enterprises will be a force multiplier that will ultimately empower you to go deeper into business logic issues, validate findings and share tasks with your team members.

 Terms and Conditions