Challenges of current pentesting activities
Penetration testing is an integral part of any organisation’s security posture but remains a frustrating experience for many security teams.
Handling multi-channel engagement and multiple reporting formats absorbs valuable time that could be spent following up and fixing vulnerabilities.
Key advantages of YesWeHack Pentest Management
The YesWeHack Pentest Management solution addresses these challenges holistically to simplify how your pentests are managed today.
Centralize pentest findings from all sources into a single and intuitive reporting interface
Rely on standard reports containing all the necessary information to process vulnerabilities
Provide a secure channel enabling your operational teams and the pentesters to communicate seamlessly for each vulnerability reported during the campaign
Integrate pentest report data into existing tools and internal workflows to streamline follow-up and enhance remediation
Generate a final and comprehensive report for each campaign, comprising detailed pentest findings or an Executive Summary to serve as a proof of audit
Meet compliance or certification requirements
ℹ️ To know more precisely how to create and configurate a pentest program, most of the steps below are detailed in a dedicated article here.
Key steps of a pentest campaign
Discover the key steps of a pentest campaign managed through the YesWeHack platform. Deep-dive on each step with our dedicated articles.
Step 1: Campaign set up
The first step is to create your Pentest program on the platform.
Create a campaign
Invite pentesters and your team (e.g. program manager) on your program.
Appoint a Pentest lead. This is a mandatory step as this person will be the one able to generate the final pentest report
(Optional) Setup a credentials pool for pentesters to grant them access to restricted scopes.
ℹ️ Learn more about credentials pool in this article.
Start your pentest program!
Step 2: Process reported vulnerabilities
Assess the vulnerabilities and interact with your pentesters directly on the platform
Leverage the same platform for each and every one of your pentest providers
ℹ️ Learn more about report management here.
Go to the "Vulnerability Center"
Open any given report to access detailed bug information and means to communicate with the pentesters
Step 3: Manage your Pentest program
You can pause & resume the campaign as many times as necessary
ℹ️ Pausing can be helpful if you want to fix critical vulnerabilities before moving forward.
Keep a draft report updated throughout the pentest process
Step 4: End the campaign
Stop the campaign on the platform once it is completed
Ask the pentest lead to generate the final report.
ℹ️ The final report can only be exported once the campaign is finished. To know how to generate the final report, click here.