Step 1. Sign up
Step 2. Purchase the service
Step 3. Deliver the service
After making the purchase online, go to the PTS console, click Create pen-test, enter relevant parameters, and click Submit. Step 4. Review the service
After receiving your application, we will review it to determine the actual workload of testing the targets, confirm the basic information of emergency response with you, establish communication channels, and schedule tests.
Step 5. Implement the service
We will conduct penetration tests on the target systems based on the approval and communication.
Step 6. Submit a report
After implementing the service, we will prepare a penetration test report and send it to you, including the details of identified vulnerabilities, PoC for vulnerability verification, and suggestions on fixing the vulnerabilities.
Step 7. Assist in fixing the vulnerabilities
We will provide an online expert explanation of the penetration test result to help you fix the vulnerabilities.
Based on the rectification result, we will retest the application on the same version for the identified vulnerabilities three times free of charge to ensure that they have been completely fixed.
Step 9. Accept the service
After the regression tests are performed, the service will be automatically terminated, but you can still view the results of previous tests in the PTS console. If you have any questions about penetration or regression test reports, contact us for assistance.
Was this page helpful?