Onboarding Guide

This documentation page provides an overview of the onboarding process, helping you set up your account.

1. Introduction and First Login

Once your initial registration is complete, your account will undergo a review process by our team. Only after it has been approved will you be able to log in to the ETHIACK Portal.

Upon your first login, you'll be guided through an onboarding panel that walks you through the necessary steps to activate your account and start testing.

2. Adding Your Domain

The first configuration step is to add at least one domain. We recommend starting with your primary organizational domain (e.g., example.com).

3. Domain Ownership Verification

To begin testing, ETHIACK requires confirmation that you own or manage the added domain(s). This step enables our Artiackers to monitor changes in your infrastructure and safely conduct Black Box security assessments.

Verification Process

  1. A DNS TXT record will be provided.
  2. You can:
    1. Copy and manually add the record to your DNS settings
    2. Forward the instructions to a colleague with DNS management access.
  3. Once the record is added, click "Verify" in the ETHIACK portal.

4. Automated Subdomain Reconnaissance

Once domain ownership is successfully verified, ETHIACK automatically initiates a subdomain reconnaissance process.

  • The platform scans and identifies all accessible subdomains associated with the verified domain.
  • Discovered subdomains are listed in your ETHIACK portal and automatically added to your asset inventory.

    You will then be able to:

    • Mark subdomains as in-scope or out-of-scope.
    • Monitor and manage their exposure.
    • Customize testing coverage based on your security policies.

    This step is crucial for ensuring complete visibility of your external attack surface before automated or manual testing begins.

    5. Review Terms of Service

    Before launching any assessments, you are required to review and accept ETHIACK’s Terms of Service, which outline:

    • Testing policies
    • Use of Artificial and Human Hackers
    • Responsibilities and data protection measures

    Acceptance is mandatory to proceed with vulnerability scanning and human testing operations.

    6. Access the ETHIACK Portal

    Once setup is complete and the terms are accepted:

    • You can access the ETHIACK Portal.
    • Automated vulnerability testing will begin shortly thereafter.
    • Human Hacker campaigns can be scheduled or triggered as needed.
    • Detected vulnerabilities will be reported directly within the portal in near real-time.

    Prefer a Video Walkthrough?

    If you prefer a visual explanation of the onboarding process, we’ve prepared a short video guide that walks you through each step: