Plan and Scope the Pentest

Set up a schedule. Scope the pentest.

Set the start date for your pentest and define its scope.

Workflow for creating a pentest

In the fourth step of the pentest wizard, you can:

Schedule and scope your pentest

Schedule the Pentest

Depending on your PtaaS tier, you can schedule pentests with a start date from at least one to three business days after submitting it for review. Pentests submitted after 11 AM PST (19:00 UTC) will require an additional business day start time.

If you have any special requirements, such as qualifications for pentester certifications, we reserve the right to start the pentest later than the flow time specified in your PtaaS tier.

Set a start date for your pentest

Pentest Timelines

Pentest timelines depend on the pentest type, scope, and other factors. When you schedule your pentest and set a start date, the end date populates automatically.

Standard pentest timelines:

Learn more about the pentest types.

Scope the Pentest

The complexity of your asset determines the number of credits required for a pentest. The bigger the pentest scope, the more credits you need.

A Cobalt credit is a standardized unit of work that represents 8 pentesting hours. You can think of a Cobalt credit as a virtual voucher that you consume whenever you want to run a pentest. Learn more about Cobalt credits.

To set the pentest scope, identify the complexity of your asset. Under Scoping, specify the number of characteristics associated with the asset that need to be tested. To get exact numbers, consult with the asset owner inside your organization.

Scoping parameters differ for each asset type:

Once you’ve scoped the pentest, review the required credits, as determined by our algorithm.

Web

To scope a pentest for a Web asset, specify the number of the following characteristics of the asset that need to be tested.

Scoping parameters for a Web asset

ParameterDefinitionScoping Guidelines
User RolesA User Role is a user group within an application with specific permissions, such as an administrator, manager, or guest.

Enter the number of User Roles in your Web asset that need to be tested.

Determine User Roles based on personas, or target user groups of your asset. Group user permissions into several levels, and count the number of such groups.

Dynamic Pages/Routes

A dynamic page is a unique web page that facilitates user interaction, such as submitting data, entering parameters, or uploading content.

  • Read-only static pages are not counted because there is no interaction.
  • A product catalog is not measured because the page workflow is not unique.

A Route is a system for resource navigation in single-page applications (SPAs). In SPAs that use frameworks such as Angular, React, or Ember, routes provide unique URLs to specific content within the application.

Determine the type of your Web asset:
Usually, an application includes one or more routing modules or files where you can retrieve the number of pages or routes using special commands or tools.

Mobile

To scope a pentest for a Mobile asset, specify the number of the following characteristics of the asset that need to be tested.

Scoping parameters for a Mobile asset

ParameterDefinitionScoping Guidelines
Operating Systems

An operating system (OS) is software that allows smartphones, tablets and other devices to run applications and programs.

Enter the number of operating systems (iOS, Android, Windows Mobile, etc) in your Mobile asset that need to be tested.

Native applications are built to run on a specific mobile operating system, such as iOS or Android.

Non-native applications are built to run on multiple operating systems.

API

To scope a pentest for an API asset, specify the number of the following characteristics of the asset that need to be tested.

Scoping parameters for an API asset

ParameterDefinitionScoping Guidelines
User RolesA User Role is a user group within an application with specific permissions, such as an administrator, manager, or guest.

Enter the number of User Roles in your API asset that need to be tested.

Determine User Roles based on personas, or target user groups of your asset. Group user permissions into several levels, and count the number of such groups.

Endpoints / GraphQL Queries and Mutations

A RESTful API Endpoint is a URL where an API receives requests about a specific resource on its server.

A GraphQL Query is a method to fetch data.

A GraphQL Mutation is an operation that allows you to modify server-side data.

We can test both RESTful and GraphQL APIs. However, these APIs work in different ways.

  • RESTful APIs set up data on different endpoints.
    • Enter the number of RESTful API endpoints in your API asset to test.
    • Ignore specific parameters and HTTP methods for each endpoint. For example, GET https://api.cobalt.io/pentests and POST https://api.cobalt.io/pentests are two different HTTP requests for the same endpoint.
  • GraphQL APIs have a single endpoint, but use mutations to manage different categories of data. Queries allow you to fetch data, while mutations allow you to modify it.
    • Enter the number of queries and mutations in your API asset to test. For pentest purposes, that’s functionally equivalent to the number of RESTful API endpoints.

If you’re using API tools such as Swagger, Postman, or Insomnia to work with your API asset, you can count the number of endpoints or GraphQL queries and mutations in these tools.

External Network

To scope a pentest for an External Network asset, specify the number of IP addresses in your external network that need to be tested.

Scoping parameters for an External Network asset

ParameterScoping Guidelines
IP AddressesEnter the number of active IP addresses in your external network that need to be tested.

Internal Network

To scope a pentest for an Internal Network asset, specify the number of IP addresses in your internal network that need to be tested.

Scoping parameters for an Internal Network asset

ParameterScoping Guidelines
IP AddressesEnter the number of active IP addresses in your internal network that need to be tested.

Desktop

To scope a pentest for a Desktop asset, specify the number of the following characteristics of the asset that need to be tested.

ParameterDefinitionScoping Guidelines
Operating Systems

An operating system (OS) is software that allows desktop devices to run applications and programs.

Enter the total number of operating systems in your desktop application that need to be tested. Examples of desktop operating systems include Microsoft Windows, macOS, various Linux distributions, and others.

AI/LLM Pentesting

To scope an AI/LLM pentest specify the Number of independent LLM features to be tested.

ParameterDefinitionScoping Guidelines
LLM Features

A specific capability or functionality exhibited by a Large Language Model (LLM).

Enter the total number of LLM features within your application that need to be tested. Example of a feature include a chatbot.

If multiple independent features are selected, the results will be documented in the same report and findings will reported in the same pentest. If seperate reports are needed, it’s recommended to run seperate pentests for them.

AI/LLM pentests are available for Web assets only.

Assets of Multiple Types

Sometimes, assets fit into more than one category. To that end, Cobalt supports pentests on assets in the following groups of categories:

To scope a pentest for a combined asset, specify the number of characteristics for each asset type that it includes. Refer to the corresponding sections of this guide for details.

View Required Credits

Once you’ve identified the pentest scope, you can see the number of estimated credits in Credits Per Pentest. Whenever you adjust the scope, our algorithm updates the number of credits.

You can see the final number of required credits when the pentest is Planned, after we review your pentest request.

Assign a Point of Contact

Cobalt Staff may reach out to the point of contact with questions regarding the pentest.

  • You can assign yourself as the point of contact.
  • To assign other users, go to the Collaborators tab on the pentest page.
  • Organization Owners, Organization Members, and Pentest Team Members can assign a point of contact when the pentest is in the Draft or In Review states.

Assign a point of contact for a pentest

Next Step

If you’re ready with your pentest, select Save & Exit. In the next screen, you can review your work before submitting the pentest.

Last modified March 19, 2025