Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Current »

CS-Video.pnghttps://youtu.be/yHhGHDrd9qY

What is the Attack Surface Mapper? 🤔

Attack Surface Mapper scan covers various aspects of a domain's web presence and associated cloud services. By deeply scanning webpage content, headers, and cloud storage services like Open S3 buckets and Open Azure blobs, the scan aims to identify security vulnerabilities and exposures.


Here's how such a scan works:

  1. Webpage Content and Headers: The scan would analyze the HTML content of webpages associated with the domain, looking for references to external resources like images, scripts, stylesheets, and iframes. It would also inspect HTTP response headers such as Content-Security-Policy and Permissions-Policy to understand the security policies and identify any misconfigurations or weaknesses.

  2. Open S3 Buckets and Open Azure Blobs: The scan would check for any open or publicly accessible S3 buckets associated with the domain or its subdomains. Similarly, it would look for publicly accessible Azure blobs or other cloud storage resources. This involves querying DNS records, analyzing website content, and requesting known cloud storage endpoints.

  3. Cloud Provider Information: The scan utilizes APIs provided by cloud service providers to gather information about the domain's cloud infrastructure, including details about storage resources and other services. This could help identify potential security risks associated with cloud configurations.

  4. Subdomain Enumeration: The scan would identify any subdomains associated with the domain by examining DNS records and performing subdomain enumeration techniques. It then analyzes these subdomains to determine if they point to cloud storage endpoints or other relevant resources.

By combining these techniques, the scan provides a comprehensive assessment of the domain's attack surface, highlighting potential security weaknesses and areas for improvement.


For a list of the IPs used for Attack Surface Mapper (ASM) scanning, please check out the documentation page here: V4 Agent Configurations


What data is captured by the Attack Surface Mapper scan? 🤔

Here is what you will see once you have completed the Attack Surface Mapper scan against a domain.

image-20240202-200328.png

Data Label

Description / Use Case

DNS Records

Displays the DNS (Domain Name System) records associated to the domain. Different types will include A, MX, NS, TXT, and SOA record types. These help in the translation of a human-readable domain to an actual IP address. (IE: Phonebook for the Internet)

image-20240202-200715.png

MX Records

Displays the MX (Mail Exchange) record for the domain. This help to route email to the correct email server(s).

image-20240202-200519.png

Open Ports

Displays the count of open ports with the protocol. Ports are used for communication between software applications and services running on a device. The IANA maintains the full listing found here: IANA Ports Guide

image-20240202-200650.png

RAW Headers

Displays the RAW Header information for the domain, which includes Cache Control, Connection, Content-length, Content Encoding, Content Type, Date, Etag, Keep-alive, Server, Set Cookie, Vary, X-host, and X-us-compatible information. This information is used for communication between web browsers and servers.

image-20240202-200539.png

S3 Buckets

Displays any S3 (Amazon Simple Storage Service) buckets/containers for the domain; these are used for storing and organizing data on the Amazon Web Services (AWS) platform.

image-20231228-213925.png

SPF Records

Displays the Sender Policy Framework (SPF), DNS record for the domain. This helps in preventing email spoofing and phishing by verifying that an email sent from an authorized server.

Subdomains

Displays the count of Subdomains found the main domain.

image-20240202-200435.png

Target IPs

Displays the public or target IP for the domain.

image-20240202-200402.png

Vulnerabilities

Displays the count of Vulnerabilites; the CVE-ID, Severity, Description, EPSS Score, Base Score, Impact Score, and Exploitability Score will be included.

image-20231228-213531.png


Company Attack Surface Mapper - Table of Contents


Company Attack Surface Mapper - Overview

ASM is designed with two main sections; Configurations and Results.

image-20240911-142756.png

Configurations are where you will configure the attack surface mapper scan parameters.

Results are where you can view the results from the UI, or use the Standard Report.


Company Attack Surface Mapper - Details

Add Domain Configuration

When you save a new configuration in Attack Surface Mapper, a scan will start immediately. To postpone the scan, check the "Scan Later" checkbox.

Tap on Add

image-20240911-143046.png

Complete the required fields as shown here:

image-20240911-143120.png

Do not include the https:// or .com in the Domain* field

Tap Save when completed.


Edit Domain Configuration

Use the three-dot Action menu to access the Edit Configuration

image-20240911-143357.png

Remove Domain Configuration

Use the three-dot Action menu to access the Remove Domain option.

image-20240911-143345.png

Scan Now

Use the three-dot Action menu to use the Scan Now option.

image-20240911-143427.png

Jobs

Tap the Jobs icon to see a history of the Jobs running for the company selected.

image-20240911-143458.pngimage-20240911-143445.png

Alerts

You can use the timeline style to view the changes and updates in the System Events.

image-20240911-143523.png

Need Support?

Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login

image-20240206-144508.png
  • No labels