Scoping Wizard Basic InformationName *Email Address *Engagement Type *Penetration TestVulnerability AssessmentPhishing SimulationOtherPenetration Test Type *Web ApplicationMobile ApplicationDesktop ApplicationAPINetworkVulnerability Assessment Type *Web ApplicationMobile ApplicationPentest Approach *Black-BoxGrey-BoxWhite-BoxVulnerability Assessment Approach *Black-BoxGrey-BoxWhite-Box ExplainedWhite-box penetration testing grants testers full access to the system's details, including source code, network layouts, and similar, enabling a thorough understanding and comprehensive evaluation of the system's architecture and design.Grey-Box ExplainedGrey box penetration testing combines black and white box methods, providing the tester with limited system information, such as network layouts and access details, to enhance understanding of the system's structure and operations.Black-Box ExplainedBlack box penetration testing simulates an external attack on a system without prior knowledge, akin to an outsider attempting a breach without inside information.Learn morehttps://pentestwizard.com/black-box-vs-grey-box-vs-white-box/ScopeWeb Application(s)RequirementsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the necessary access to the target in scope Halt all deployments in the test environment during the test period Provide us with a point of contact in case we have any questions Number of Pages *How many pages does the application have?Number of User Roles *How many user roles does the application have?Additional InfoAdd itemRemove itemMobile Application(s)RequirementsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the necessary access to the target in scope Provide us with the mobile application build files (.apk/.ipa) Provide us with a point of contact in case we have any questions Mobile Platform *Please select an optionAndroidiOSOtherAdditional InfoAdd itemRemove itemDesktop Application(s)RequirementsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the necessary access to the target in scope Platform *Please select an optionWindowsLinuxMac OSOtherAdditional InfoAdd itemRemove itemAPIRequirementsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the necessary access to the target in scope Halt all deployments in the test environment during the test period Provide us with the API documentation Provide us with a point of contact in case we have any questions Number of User Roles *How many user roles does your API have?Number of Endpoints *How many API endpoints does your API have?Is the API GraphQL based?YesNumber of Queries? *How many queries does your GraphQL have?Number of Mutations *How many mutations does your GraphQL have?Additional InfoAdd itemRemove itemNetworkRequirementsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the necessary access to the target(s) in scope Network Type *Please select an optionExternal NetworkInternal NetworkSelect the type of the network in scopeNumber of IPs *How many IPs are in the network?Additional InfoAdd itemRemove itemPhishing SimulationRequreimentsBefore and during the penetration test, we expect a few requirements to be met: Provide us with the target email addresses Whitelist our attacker's IP address Phishing Type *Please select an optionCredentialsMalwareNumber of People *How many people would you like to include in simulaiton?Additional InfoAdd itemRemove itemOther *UrgencyIt is urgentUrgency DateChose a start date. We will do our best to match your desired date.Date *Prefered Start DatesChose multiple start dates that would work the best for you. We will do our best to match your desired date.Date *Add itemRemove itemRequest QuotePlease do not fill in this field.