Keep track of what you’re exposing to the Internet
Exposed subdomains, private git repositories, and open ports that should actually be closed - these are just a few assets which attackers can exploit to gain access to company sensitive information. Asset Monitoring mimics the reconnaissance methods attackers use to map out a target’s attack surface and its potential weaknesses. This powerful web vulnerability scanner automates security modules at scale to cover a wide attack surface, and checks for entry point vulnerabilities that could be chained for more critical vulnerabilities.
Web vulnerability testing executed by Detectify Asset Monitoring: - Sensitive file exposure - Secrets exposed in page responses including API keys and passwords - Single request/response tests for XSS, SSRF, and RCE vulnerabilities - Path traversal - Exposure of data through internal software (e.g. monitoring)
Additional features in asset monitoring
But wait, there’s more! asset monitoring helps you track technologies and potential subdomain takeovers: