Help & Documentation

Getting Started

How to Perform a Security Scan

  1. Enter the website URL or domain in the scan field
  2. Click "Scan Now" to start the security assessment
  3. Wait for the scan to complete (usually takes 1-2 minutes)
  4. Review the detailed security report
  5. Follow the recommendations to improve your security

Understanding Your Security Score

Your security score is calculated based on several factors:

  • 90-100: Excellent security posture
  • 70-89: Good security with minor improvements needed
  • 50-69: Fair security requiring attention
  • Below 50: Poor security requiring immediate action

Security Features Explained

SSL/TLS Analysis

Checks your SSL certificate validity, encryption strength, and configuration. Identifies issues like expired certificates, weak ciphers, and missing security headers.

Security Headers

Analyzes HTTP security headers like CSP, HSTS, X-Frame-Options, and others that protect against common web vulnerabilities.

Vulnerability Detection

Scans for common web vulnerabilities including SQL injection, XSS, CSRF, and other security issues that could be exploited by attackers.

WordPress Security

Specialized checks for WordPress sites including version detection, plugin analysis, and WordPress-specific security configurations.

Common Issues & Solutions

Scan Failed - Connection Timeout

This usually means the target website is not accessible or blocking our scanner.

  • Verify the website URL is correct and accessible
  • Check if the website has firewall rules blocking automated requests
  • Try scanning from a different network or location

Low Security Score

A low score indicates several security issues that need attention.

  • Implement missing security headers
  • Update your SSL certificate if expired
  • Fix identified vulnerabilities
  • Keep all software and plugins updated

False Positives

Sometimes our scanner may flag legitimate configurations as security issues.

  • Review each finding carefully
  • Consider your specific use case and requirements
  • Consult with your development team for clarification
  • Contact support if you believe a finding is incorrect

Security Best Practices

Website Security Checklist

Essential Security Headers

  • Content-Security-Policy (CSP)
  • Strict-Transport-Security (HSTS)
  • X-Frame-Options
  • X-Content-Type-Options
  • Referrer-Policy

Regular Maintenance

  • Keep software updated
  • Use strong passwords
  • Enable two-factor authentication
  • Regular security scans
  • Monitor for suspicious activity

API Documentation

REST API Endpoints

Integrate Pentesterr security scanning into your applications using our REST API.

POST /api/scan
// Perform a security scan
Headers: Content-Type: application/json
Body: {
"url": "https://example.com",
"email": "user@example.com"
}

For complete API documentation, authentication details, and example code,contact our support team.

Still Need Help?

Can't find what you're looking for? Our support team is here to help you with any questions or issues.