Ask the hacking team to explain a vulnerability | Fluid Attacks Help

Ask the hacking team to explain a vulnerability

Role requirement info
Plan required: Advanced
An Advanced plan subscription gives you access to explanatory sessions with Fluid Attacks' security experts:
  1. You can comment requesting explanations on the Consulting section of the type of vulnerability in question.
  1. You can have video meetings with an ethical hacker using the option Talk to a hacker.

Comment on a type of vulnerability

To leave a comment in the Consulting section, follow these steps:

  1. Open the To do section to see the list of vulnerabilities assigned to you.

    See the vulnerabilities assigned to you on the Fluid Attacks platform

  2. Click the name of the type of vulnerability you need help with to enter its Locations section.

    Select the vulnerability assigned to you on the Fluid Attacks platform

  3. Open the Consulting tab.

    Open the consulting tab of a vulnerability on the Fluid Attacks platform

  4. Write your comment in the text box and click on Comment when you are done.

    Publish a comment on a vulnerability on the Fluid Attacks platform

One of Fluid Attacks' experts will answer you shortly in the comment thread.

Have a video meeting with an ethical hacker

To schedule a video meeting with an ethical hacker, do the following:

  1. Go to your group.

  2. Click the Help button in the collapsible menu on the left and select Talk to a hacker.

    Find the Talk to a hacker option on the Fluid Attacks platform

    You can also click the Talk to a hacker button located at the bottom of several sections, such as in the Vulnerabilities section.

  3. Verify that you have already looked for information about the vulnerability in Fluid Attacks' documentation.

    Declare you have read before talking to a Fluid Attacks ethical hacker

  4. Follow the prompts and click on Schedule Event when you are done.

    Schedule a meeting with a Fluid Attacks ethical hacker

You will then receive a confirmation with the information about the meeting.

After understanding the vulnerabilities, and then remediating them, you can request verifications to find out if your fixes worked.