Help & Documentation
Getting Started
How to Perform a Security Scan
- Enter the website URL or domain in the scan field
- Click "Scan Now" to start the security assessment
- Wait for the scan to complete (usually takes 1-2 minutes)
- Review the detailed security report
- Follow the recommendations to improve your security
Understanding Your Security Score
Your security score is calculated based on several factors:
- 90-100: Excellent security posture
- 70-89: Good security with minor improvements needed
- 50-69: Fair security requiring attention
- Below 50: Poor security requiring immediate action
Security Features Explained
SSL/TLS Analysis
Checks your SSL certificate validity, encryption strength, and configuration. Identifies issues like expired certificates, weak ciphers, and missing security headers.
Security Headers
Analyzes HTTP security headers like CSP, HSTS, X-Frame-Options, and others that protect against common web vulnerabilities.
Vulnerability Detection
Scans for common web vulnerabilities including SQL injection, XSS, CSRF, and other security issues that could be exploited by attackers.
WordPress Security
Specialized checks for WordPress sites including version detection, plugin analysis, and WordPress-specific security configurations.
Common Issues & Solutions
Scan Failed - Connection Timeout
This usually means the target website is not accessible or blocking our scanner.
- Verify the website URL is correct and accessible
- Check if the website has firewall rules blocking automated requests
- Try scanning from a different network or location
Low Security Score
A low score indicates several security issues that need attention.
- Implement missing security headers
- Update your SSL certificate if expired
- Fix identified vulnerabilities
- Keep all software and plugins updated
False Positives
Sometimes our scanner may flag legitimate configurations as security issues.
- Review each finding carefully
- Consider your specific use case and requirements
- Consult with your development team for clarification
- Contact support if you believe a finding is incorrect
Security Best Practices
Website Security Checklist
Essential Security Headers
- Content-Security-Policy (CSP)
- Strict-Transport-Security (HSTS)
- X-Frame-Options
- X-Content-Type-Options
- Referrer-Policy
Regular Maintenance
- Keep software updated
- Use strong passwords
- Enable two-factor authentication
- Regular security scans
- Monitor for suspicious activity
API Documentation
REST API Endpoints
Integrate Pentesterr security scanning into your applications using our REST API.
For complete API documentation, authentication details, and example code,contact our support team.
Still Need Help?
Can't find what you're looking for? Our support team is here to help you with any questions or issues.