Skip to main content

Records

Clicking on the Records tab, you can see a section with a table showing the information our ethical hackers obtained after exploiting the specific type of vulnerability in your system that you are exploring. All the information included there, which varies from case to case, we consider to be sensitive and relevant to your organization. You might see financial information (e.g., account numbers, financial movements, credit card numbers), personal information (e.g., phone numbers, contacts, personal IDs, physical addresses), technical information (e.g., roles, keys, access tokens), among others.

Records