Advanced Scan
This is the option that you can use to customise profiles, policies and schedules.
3.1. Creating a new Profile
This is the section in which you can find SMTP, POP3, IMAP or OWA access information of the email service which is to be tested.
3.1.1. Profile Information
In order to create a profile, this wizard helps you to complete settings.
3.1.2. SMTP
SMTP is the mail sending protocol used in order to define the validity of the credentials given by the companies by connecting with the SMTP information they provided.
3.1.3. POP3 & IMAP
Pop3 and IMAP are protocols that allow us to access emails in the mail server to our computer.
3.2. Creating a New Policy
The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.
3.2.1. Profile
We apply the policy to the profile(s) that we created in the previous steps.
3.2.2. Plugins
This section enables us to select plugins for customising the policy. For example, you can test your email service only by using a specific threat vector-like ransomware or Malicious Attachments or only test with Meterpreter Sample 1.
3.3. Creating a Schedule Scan
3.3.1. Schedule
We can schedule tests daily, weekly, monthly and yearly intervals.
4. Profiles
4.1. Create
In order to create a profile, the wizard helps you to complete settings. You can find SMTP, POP3, IMAP or OWA access information of the email service, which is to be tested.
5. Policies
The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.
6. Schedules
We can see a list of our scheduled tests, and we can access their reports.
6.1. Selecting a company
This feature is for Root and reseller accounts. You can select a company to see their schedules of ETS.
6.2. Create
You can create a new ETS schedule.
7. Reports
You can access the reports of all tests.
8. Plugins
Each email-based attack type on ETS named as a plugin. You can list all categories and plugins on this page.
8.1. Create Plugins
You can create a new plugin (a new email-based attack vector) here.
8.1.1. Plugin Information
Name | Definition |
Plugin Category * | Select a category |
Plugin Name * | Type a plugin name |
Plugin Body * | Explain plugin details |
Synopsis * | Explain the plugin shortly |
Description * | Explain plugin details |
Solution * | Type solutions |
PublicationDate | The date when the Plugin published |
Risk Factor * | Type the Risk Factor of |
Effect * | The systems it will affect |
8.1.2. Mail Content
Name | Explanation |
EML * | Upload the plugin in EML file format |
Header Name | Add the name to the Header optionally. |
Header Value | Add the value to the Header optionally. |
Last updated