Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel7

...

Info

The domain name functions as a link to the IP address. Links do not contain actual information, but they do point to the place where the IP address information resides. It is convenient to think of IP addresses as the actual code and the domain name as a nickname for that code.

  • In IP ranges, if the Domain Name is chosen as the Discovery Type then enter the name of your choice and the Domain name to be scanned, Exclude IP from scanning, and add the IP Ranges to be excluded from Scan.

  • Click on Save once the above credentials are provided.

...

Info
  • The Master credentials section will be used to do an authenticated asset scan and find vulnerabilities, without going by updating the credentials for each asset. Here a common set of credentials for OS like Windows, Mac, and Linux can be used.

  • Azure AD assets can be scanned by adding Master credentials and setting up network share access.

Prerequisites for Master Credentials:
🔸 Windows machine
1. SMB should be enabled (port: 445)
🔸 Linux based OS
1. ssh access should be enabled for the end machine (asset).
2. The user should have sudo privileges on the asset.
3.User should have access to the sudo command without a password.
🔸 Darwin-based OS(MAC)
1. ssh should be enabled in the endpoint machine.
2.User should have sudo privileges.
3.User should have access to the sudo command without a password.
🔸 VMware based OS
1. ssh should be enabled in the endpoint machine.
2. User should have access to the sudo command without a password.

...