Advanced Scan

This is the option that you can use to customise profiles, policies and schedules.

3.1. Creating a new Profile

This is the section in which you can find SMTP, POP3, IMAP or OWA access information of the email service which is to be tested.

3.1.1. Profile Information

In order to create a profile, this wizard helps you to complete settings.

3.1.2. SMTP

SMTP is the mail sending protocol used in order to define the validity of the credentials given by the companies by connecting with the SMTP information they provided.

3.1.3. POP3 & IMAP

Pop3 and IMAP are protocols that allow us to access emails in the mail server to our computer.

3.2. Creating a New Policy

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.

3.2.1. Profile

We apply the policy to the profile(s) that we created in the previous steps.

3.2.2. Plugins

This section enables us to select plugins for customising the policy. For example, you can test your email service only by using a specific threat vector-like ransomware or Malicious Attachments or only test with Meterpreter Sample 1.

3.3. Creating a Schedule Scan

3.3.1. Schedule

We can schedule tests daily, weekly, monthly and yearly intervals.

4. Profiles

4.1. Create

In order to create a profile, the wizard helps you to complete settings. You can find SMTP, POP3, IMAP or OWA access information of the email service, which is to be tested.

5. Policies

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.

6. Schedules

We can see a list of our scheduled tests, and we can access their reports.

6.1. Selecting a company

This feature is for Root and reseller accounts. You can select a company to see their schedules of ETS.

6.2. Create

You can create a new ETS schedule.

7. Reports

You can access the reports of all tests.

8. Plugins

Each email-based attack type on ETS named as a plugin. You can list all categories and plugins on this page.

8.1. Create Plugins

You can create a new plugin (a new email-based attack vector) here.

8.1.1. Plugin Information

Name

Definition

Plugin Category *

Select a category

Plugin Name *

Type a plugin name

Plugin Body *

Explain plugin details

Synopsis *

Explain the plugin shortly

Description *

Explain plugin details

Solution *

Type solutions

PublicationDate

The date when the Plugin published

Risk Factor *

Type the Risk Factor of

Effect *

The systems it will affect

8.1.2. Mail Content

Name

Explanation

EML *

Upload the plugin in EML file format

Header Name

Add the name to the Header optionally.

Header Value

Add the value to the Header optionally.

Last updated