Customers should fill in the following information truthfully
1.The detected IP host information;
2.The comparison of domain name registration information must be true and legal information of the customer;
3.The client is a e Cloud hosting user, and the user provides a list of domain names. After the analysis, it must be the e Cloud host IP to provide penetration testing services;
4. The application URL description provided by the customer must specify the function or purpose.
5.The contact information of the business interface person, the customer needs to provide a business interface person contact who has the right to decide on the penetration test plan and the problems that arise during the penetration test;
6.If customers have security protection equipment, they should add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test to avoid warnings caused by penetration testing. (If the client did not add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test, Party B shall not bear any responsibility for the resulting alerts and the impact on the penetration test results)
7.The client needs to sign a penetration test authorization letter.