Skip to main content

Attack Surface Monitoring

Monitoring process to detect open ports, technologies used, identified subdomains, SSL and domain expiration, and security headers on your target.

Access Attack Surface Monitoring via the Navigation Menu

catatan

Users can scan using pentest Tools via the "VAPT Tools" navigation menu. By clicking on the "VAPT Tools" menu, various tools will appear, then click Attack Surface Monitoring tool.

Select Attack Surface Monitoing Scanner Navbar Capture

Attack Surface Monitoing Capture

To schedule Attack Surface monitoring, follow these steps

  1. Enter the target value a domain, URL, or IP(s) into the Target textbox
  2. Select the frequency, time, time zone, and hour to use for scheduling the monitoring
  3. Click Apply to start the initial scan, subsequent scans will run according to the configured schedule

Access Attack Surface Monitoring Via Targets Page

catatan

The selected target will be scanned using Attack Surface Monitoring. Select the Attack Surface Monitoring tool.

Select Attack Surface Monitoring Capture

Attack Surface Monitoring Capture

To schedule Attack Surface monitoring, follow these steps

  1. Select the frequency, time, time zone, and hour to use for scheduling the monitoring
  2. Click Apply to start the initial scan, subsequent scans will run according to the configured schedule

Attack Surface Monitoring Dashboard

Attack Surface Monitoring Capture The dashboard provides an overview of detected assets and their security posture. It includes

  1. Host Locations: A world map highlighting where hosts are located
  2. Port Services: A circular chart showing open service ports (e.g., HTTP, SSH, SMTP)
  3. Technology: A word cloud displaying detected technologies (e.g., Nginx, Ubuntu, Bootstrap)
  4. Subdomains: A section indicating that no subdomain data is currently available
  5. Asset Table: Lists details such as IP address, hostname, number of open ports, technologies used, SSL and domain expiration dates, and security header grades

This interface helps users monitor their external attack surface, detect exposed services, and manage potential vulnerabilities.

info

Click the status icon to view the monitoring schedule, and click the gear icon to start or stop monitoring. Export Postman Capture

You can view more information by clicking the Details button. Export Postman Capture

Export Postman Capture

Export Postman Capture

Export Postman Capture

info
  • Tech Information : Lists detected technologies and their versions (e.g., web server, CDN, HTTP/3) used by the target
  • Host Information : Shows resolved IP(s), open ports and services with their state and detected service versions
  • Subdomains : Enumerates discovered subdomains for the target domain (useful for expanded attack-surface mapping)
  • SSL Certificate Checker : Summarizes certificate details: SANs, issuer, validity period, fingerprint and algorithm
  • Security Headers : Lists missing or present HTTP security headers and their status/values (CSP, HSTS, X-Frame-Options, etc.)
  • WHOIS Record : Displays domain registration metadata: registrar, creation/expiry dates, name servers and contact info