Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

An attack surface mapper is a tool or technique used to identify and analyze the potential vulnerabilities and entry points within a system, network, or application that could be exploited by attackers. It involves discovering assets, enumerating services, scanning for vulnerabilities, mapping dependencies and assessing risks. The goal is to gain a comprehensive understanding of the attack surface and generate actionable insights to prioritise and address potential weaknesses. By regularly assessing and updating the attack surface, security professionals can proactively mitigate risks and enhance the overall security posture.

Attack Surface Mapper checks for Domain Enumeration, Port scanning, Vulnerability scanning, Sub Domain monitoring, DNS Records Usernames, Emails.

  • Navigate to Company View and select the company of your choice.

  • Navigate to Attack Surface Mapper to set up the scan.

  • Add the Domain name and click on Scan.

  • Once clicked on scan the scan starts.

  • Once the scan completes, results are shown for the same

  • Results shows Target IP Addresses

  • Results shows S3 buckets list

  • Results shows Email Spoof Checks and Sub Domains.

This completes the Attack Surface Mapper documentation.

  • No labels