Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

External Scan - An external vulnerability scan is a scan that is conducted outside of the network you're testing. These scans target external IP addresses throughout your network, scanning perimeter defenses like websites, web applications, and network firewalls for weaknesses. CyberCNS provides external scans with configurable profiles so that you have control over the depth of the scan that needs to be performed.

Info

In order for external scan to work the IP and hostname will be scanned from the following IP Addresses based on the region. Your region is the suffix on your portal url. If your url is portaluseast2.mycybercns.com then your region is useast2. The IPs are as listed below.

Region

Originating IP Address for External Scan

USWEST2

44.231.123.15

EUCENTRAL1

35.158.55.215

EUWEST2

13.41.172.255

APSOUTHEAST2

54.206.202.191

USEAST2

3.22.165.174

...

  • Choose a company for which you need to run a scan, and navigate to the External Scan to create a profile.

...

  • In the profile sections, you can create your own profiles and can add these profiles in the Configurations section.

  • There are three Default Profiles, those that are

🔹 Quick Scan: This covers the top 1000 ports defined by IANA, which covers up to 65% risk profile.

...

  • For the added IP can get the details based on the Selected profile.

  • Information such as Ports Scan, Protocol Scan, Service Detections, OverAll Grade, Open Ports, Vulnerabilities, and Operating System Details will be displayed.

...

  • For the added IP can get the details based on the Selected profile.

  • Overall Grade, Open Ports, Vulnerabilities, Operating System Details, Common SSL Vulnerabilities, and Certificate details will be displayed.

...

  • One can download the individual External Scan result by clicking on the download icon( (blue star)).

...

Web Vulnerabilities

  • Click View Details under the Vulnerabilities section to get more information about the vulnerabilities.

  • Details such as Category, CVSS, Severity, Remediation, Impact and Description are captured for Vulnerabilities.

...