How to Use Services
Step-by-step instructions for Pentlix's security testing tools
Getting Started
Step 1: Create Your Account
Sign up with your email address and create a secure password. You'll need to verify your email and accept our Terms of Use before accessing security testing services.
Step 2: Accept Terms of Use
You must accept our Terms of Use and confirm that you will only test systems you have explicit authorization to test.
Step 3: Choose Your Service
Navigate to your dashboard and select from 6 professional security testing services:
SMTP Spoofing
Test email authentication
Data Leak Check
Search breach databases
Mobile App Scanner
Analyze APK/IPA security
Source Code Analysis
Static code security scan
Web Vulnerability Scanner
DAST web app testing
SSL/TLS Checker
Certificate validation
Step 4: Run Your First Scan
Follow the on-screen instructions for each service. Enter your target information, configure scan parameters, and review results.
Services Guide
SMTP Spoofing Tester
Tests whether a mail server properly authenticates sender identity and implements anti-spoofing measures like SPF, DKIM, and DMARC.
How to Use:
- Enter the spoofed sender email address and name
- Provide the recipient email (must be an address you control)
- Write a test subject and message
- Submit the test and check the recipient inbox
- Verify if the email was delivered, marked as spam, or rejected
Data Leak Check
Searches through public data breach databases to determine if an email, username, or other identifier has been compromised.
How to Use:
- Enter the email address or username to search
- Select the appropriate search type (email, username, etc.)
- Click "Search Data Breaches"
- Review the list of breaches where data was found
- Follow remediation recommendations (change passwords, enable 2FA)
Mobile App Scanner
Analyzes Android (APK/XAPK) and iOS (IPA) applications for security vulnerabilities, dangerous permissions, and insecure code patterns.
How to Use:
- Upload your APK, XAPK, or IPA file (max 100MB)
- Wait for the analysis to complete (1-3 minutes)
- Review the security score and identified issues
- Examine dangerous permissions and vulnerable libraries
- Implement recommended fixes before release
Source Code Analysis
Performs static application security testing (SAST) on source code to identify vulnerabilities, hardcoded secrets, and insecure coding patterns.
How to Use:
- Package your source code in a ZIP or RAR archive (max 100MB)
- Upload the archive to the scanner
- Wait for static analysis to complete
- Review findings: SQL injection, XSS, hardcoded credentials, etc.
- Remediate issues before deploying to production
Web Vulnerability Scanner
Comprehensive dynamic application security testing (DAST) that actively scans web applications for vulnerabilities like SQL injection, XSS, CSRF, and security misconfigurations.
How to Use:
- Enter the target URL (must have authorization to scan)
- Click "Start Vulnerability Scan" to initiate
- Save the Target ID provided (scans take 5-30 minutes)
- Use "Check Results" tab to monitor scan progress
- Review detailed findings, CVEs, and remediation steps when complete
SSL/TLS Checker
Evaluates SSL/TLS configuration, certificate validity, supported protocols, cipher strength, and known vulnerabilities like Heartbleed or POODLE.
How to Use:
- Enter the domain or full HTTPS URL
- Click "Start SSL/TLS Check"
- Wait for the scan to complete (30-90 seconds)
- Review certificate details, expiration dates, and chain validity
- Check for weak ciphers, deprecated protocols, and vulnerabilities
- Implement recommendations to improve security posture