Advanced Scan

This is the option that you can use to customise profiles, policies and schedules.

3.1. Creating a new Profile

This is the section in which you can find SMTP, POP3, IMAP or OWA access information of the email service which is to be tested.
Picture 4. Profile Creation Screen

3.1.1. Profile Information

In order to create a profile, this wizard helps you to complete settings.
Picture 5. Profile

3.1.2. SMTP

SMTP is the mail sending protocol used in order to define the validity of the credentials given by the companies by connecting with the SMTP information they provided.

3.1.3. POP3 & IMAP

Pop3 and IMAP are protocols that allow us to access emails in the mail server to our computer.

3.2. Creating a New Policy

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.
Picture 6. Creating a New Policy

3.2.1. Profile

We apply the policy to the profile(s) that we created in the previous steps.

3.2.2. Plugins

This section enables us to select plugins for customising the policy. For example, you can test your email service only by using a specific threat vector-like ransomware or Malicious Attachments or only test with Meterpreter Sample 1.

3.3. Creating a Schedule Scan

3.3.1. Schedule

We can schedule tests daily, weekly, monthly and yearly intervals.

4. Profiles

4.1. Create

In order to create a profile, the wizard helps you to complete settings. You can find SMTP, POP3, IMAP or OWA access information of the email service, which is to be tested.
Picture 7. Creating a New Profile

5. Policies

The policy is a section that includes ETS attack vectors, and it is customised on the screenshot below.
Picture 6. Creating a New Policy

6. Schedules

We can see a list of our scheduled tests, and we can access their reports.

6.1. Selecting a company

This feature is for Root and reseller accounts. You can select a company to see their schedules of ETS.

6.2. Create

You can create a new ETS schedule.
7. Reports
You can access the reports of all tests.

8. Plugins

Each email-based attack type on ETS named as a plugin. You can list all categories and plugins on this page.
Could not load image
Picture 9. Plugins

8.1. Create Plugins

You can create a new plugin (a new email-based attack vector) here.

8.1.1. Plugin Information

Name
Definition
Plugin Category *
Select a category
Plugin Name *
Type a plugin name
Plugin Body *
Explain plugin details
Synopsis *
Explain the plugin shortly
Description *
Explain plugin details
Solution *
Type solutions
PublicationDate
The date when the Plugin published
Risk Factor *
Type the Risk Factor of
Effect *
The systems it will affect

8.1.2. Mail Content

Name
Explanation
EML *
Upload the plugin in EML file format
Header Name
Add the name to the Header optionally.
Header Value
Add the value to the Header optionally.
Copy link
On this page
This is the option that you can use to customise profiles, policies and schedules.
3.1. Creating a new Profile
3.2. Creating a New Policy
3.3. Creating a Schedule Scan
4. Profiles
4.1. Create
5. Policies
6. Schedules
6.1. Selecting a company
6.2. Create
8. Plugins
8.1. Create Plugins