BugBase Documentation
  • 👋Welcome to BugBase Docs
  • Overview
    • 💡What we do
    • ⚡Changelogs
    • ✨Our Features
    • 📂Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • 👨‍💻Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • 🐛Submit a Bug Report on BugBase
    • 📑Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • 👨‍💼Create a Company Account
    • 🧭Navigation
    • 🛡️Assets Dashboard
    • 🗝️Credential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • 🔐VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • 🗂️Programs Dashboard
      • ⛳Create a Program
    • 📢Customer Support
    • 💵Bounty Bin
    • ⚙️Company Settings
      • 👨‍🏫Profile
      • 🏢Organisation
      • 👨‍🏭Roles and Permissions
      • 🔐Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • 📙Manage Access
    • 📈Insights Dashboard
    • 🔊Campaigns
    • 💲Understanding Currencies Used in BugBase
    • 🤝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • 🚀Apollo Community
  • Integrations
    • 🔗Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page

Was this helpful?

  1. Program guide
  2. Pentest Dashboard

Pentest Overview

PreviousPentest DashboardNextVulnerabilities Section

Last updated 1 year ago

Was this helpful?

The Overview section of our pentest platform is an essential tool for program managers to view and manage the vulnerabilities found during the pentest. It provides a comprehensive view of all the vulnerabilities found during the test, including the number of resolved and unresolved vulnerabilities, as well as the number of vulnerabilities categorized by severity level (critical, high, medium, low, and none). This information is displayed in a clear and easy-to-read format, allowing program managers to quickly identify and track vulnerabilities, and make informed decisions on how to address them.

On the right side of the page, you will find a simple timeline that displays the progress of the pentest. This timeline allows program managers to track the progress of the test and understand how long it took to complete. Additionally, a download report button is provided, which allows program managers to download the full pentest report in pdf format.

The Overview section also includes information about the Bugbase VAPT expert who conducted the test, including their name and contact information. This is important as it allows program managers to contact the expert in case of any queries or clarifications regarding the test results.

To help program managers better understand the distribution of vulnerabilities found during the test, the Overview section also includes pie charts that show the distribution of vulnerabilities by severity level and by vulnerability type. These charts provide a visual representation of the data and make it easy for program managers to identify which types of vulnerabilities are most prevalent.

In addition to the vulnerability data, the overview section also provides information about the assets tested during the pentest. This includes a list of all the affected URI found during the test, which allows program managers to understand which assets were most vulnerable and prioritize their remediation efforts accordingly. An executive summary is also provided which gives a brief overview of the findings and the progress of the test.

All of this information and data is designed to help program managers effectively manage and mitigate the risks associated with the vulnerabilities found during the pentest. The detailed data and information provided in this section, along with the ability to download the full report and contact the VAPT expert, enables program managers to make informed decisions and take appropriate actions to address the vulnerabilities found during the test.

Pentest Overview