Attack Surface Reconnaissance

Your organization’s digital presence extends far beyond your main website. Hidden subdomains, unused domains, and unpatched vulnerabilities can create an attack surface that cybercriminals love to exploit. Our Attack Surface Reconnaissance service uncovers every inch of your digital footprint to ensure that nothing slips through the cracks.

We dive deep into your domain infrastructure, map out potential risks, and provide actionable insights to secure your online assets. Whether it’s finding vulnerable subdomains or preventing subdomain takeover attacks, our service leaves no stone unturned.

A domain registrar search involves identifying all the domains registered under your organization’s name, across various registrars (e.g., GoDaddy, Namecheap). It includes checking for current, historical, and even forgotten domains that might still be linked to your organization.

Your organization may have registered domains over the years that are no longer actively managed or monitored. These domains can be prime targets for cyber-squatters or attackers looking to exploit inactive digital properties. By identifying every domain linked to your organization, you can ensure that all your assets are secure and accounted for.

A subdomain is a subdivision of your primary domain, typically used for different services or functions (e.g., “blog.example.com” or “support.example.com”). Over time, businesses create subdomains for specific projects or departments, but these subdomains can become “hidden” when they are no longer actively used or tracked.

Hidden or forgotten subdomains can be a major security risk, as they may still be active and accessible online. Attackers often target these neglected subdomains because they may not be updated or monitored, leading to vulnerabilities like outdated software or misconfigurations. Ensuring that all your subdomains are identified and secured is crucial for minimizing your attack surface.

A subdomain takeover occurs when an attacker takes control of a subdomain that is misconfigured or no longer in use. This happens when a subdomain points to a service that has been discontinued, but the DNS records still exist. Attackers can claim the abandoned resource and use it to host malicious content under your brand’s domain.

If attackers successfully take over one of your subdomains, they can use it to impersonate your brand, distribute malware, or launch phishing attacks. Subdomain takeovers can lead to significant damage to your reputation and trust, making it essential to assess and prevent these risks.

Defacing refers to the unauthorized modification of your website’s content by attackers. In a typical defacement attack, a hacker will replace your website’s pages with their own messages or images, often to deliver a political or social statement or simply to embarrass the targeted organization.

Website defacements are highly visible and can cause significant reputational damage to your business. They can undermine customer trust and signal to attackers that your security is weak. Regular defacement inspections ensure that your website and subdomains are not compromised or altered without your knowledge.

Online threat intelligence sources are databases, repositories, and platforms (both public and private) that gather and analyze data on cyber threats, vulnerabilities, and attack patterns. These sources track ongoing cyber campaigns, new vulnerabilities, leaked credentials, and much more, providing real-time insights into potential risks for organizations.

By leveraging these sources, we can identify vulnerabilities or risks specific to your domain and subdomains, helping you stay ahead of emerging threats. Using threat intelligence ensures that your organization is not only reacting to issues but proactively defending against known and evolving threats.

A passive application scan involves gathering information about the services and applications running on your domains and subdomains without actively interacting with them. Unlike active scans, which probe systems and can trigger alarms or disruptions, passive scans collect data from publicly available sources and analyze it quietly.

Passive scanning is a stealthy way to understand your attack surface without interfering with your systems. It allows you to uncover exposed services, unprotected assets, and running applications that might not be visible in traditional monitoring. This method minimizes risks while giving you valuable insights into potential entry points for attackers.

An online vulnerability threat intelligence assessment goes beyond traditional vulnerability scanning by using real-time intelligence sources to identify risks to your domains and subdomains. Instead of simply scanning for known issues, we cross-reference your digital assets with databases that track new and evolving vulnerabilities, both public and private.

Standard vulnerability scans may not detect emerging threats or issues specific to your industry. By integrating threat intelligence, you gain a more comprehensive understanding of the vulnerabilities that cybercriminals are currently targeting. This proactive approach ensures that you stay one step ahead of attackers.

A dark web search involves scanning dark web forums, marketplaces, and criminal sites for credentials that may have been stolen from your organization and leaked online. These credentials often include email addresses, passwords, or other sensitive data that attackers can use to gain unauthorized access to your systems.

Stolen credentials are a major source of data breaches. By identifying and mitigating leaked credentials early, you can secure compromised accounts before they are used maliciously. This service provides an additional layer of protection against account takeover attacks and other credential-based threats.

Core Deliverables

  • Security Report

    You will receive a thorough report outlining the security assessment of your entire digital infrastructure. This report will include the overall findings, risks, and vulnerabilities detected across your domain landscape, as well as recommendations for improving security.

  • Findings Spreadsheet

    The spreadsheet will include a breakdown of all the findings, such as: Identified subdomains (active, hidden, and historical), Discovered vulnerabilities (public and private intelligence sources), Detected typo-squatting and cyber-squatting domains, Subdomain takeover risks, and Leaked credentials from the dark web. This document provides a clear, actionable summary of all the key areas of concern and offers a structured way for your team to address these issues.

  • Consultation

    Depending on your selected plan, you will receive expert consultation to walk you through the report and findings. We will help you prioritize actions, clarify technical aspects, and assist in developing a strategy to address vulnerabilities and risks.

Strategic Benefits

price-icon1.png

Essential

$ 2499 (exc GST)
  • recursive domain search

    Identifies all current and historical domains associated with your organization to ensure no assets are left unmonitored.

  • Subdomain reconnaissance

    Scans for active, hidden, and historical subdomains that may pose security risks due to lack of visibility or oversight.

  • Dark web search

    Searches the dark web for leaked credentials or sensitive information associated with your domains to prevent unauthorized access.

  • vulnerability threat intel

    Gathers information from public and private sources to identify vulnerabilities in your domain and subdomain infrastructure.

  • takeover assessment

    Assesses misconfigured or inactive subdomains to prevent attackers from gaining control over your online assets.

  • defacing assessment

    Monitors your domains and subdomains for unauthorized content changes that could damage your reputation.

  • passive scan

    Scans applications and services passively to detect available vulnerabilities, exposed assets, or misconfigurations, all without interacting directly with the system.

  • Priority Action Plan

    Delivers a clear, step-by-step plan to address identified risks and strengthen your overall security posture.

  • Detailed Report

    Provides a comprehensive report on all findings, including vulnerabilities, threats, and actionable recommendations.

  • Up to 5-Hours Consultation

    Offers expert guidance on implementing the recommendations and addressing any security concerns identified in the assessment.

For organizations seeking a full-scale overview of their domain landscape, covering key aspects of their attack surface.

price-icon1.png

Advanced

$ 4999 (exc GST)
  • recursive domain search

    Identifies all current and historical domains associated with your organization to ensure no assets are left unmonitored.

  • Subdomain reconnaissance

    Scans for active, hidden, and historical subdomains that may pose security risks due to lack of visibility or oversight.

  • Dark web search

    Searches the dark web for leaked credentials or sensitive information associated with your domains to prevent unauthorized access.

  • vulnerability threat intel

    Gathers information from public and private sources to identify vulnerabilities in your domain and subdomain infrastructure.

  • takeover assessment

    Assesses misconfigured or inactive subdomains to prevent attackers from gaining control over your online assets.

  • defacing assessment

    Monitors your domains and subdomains for unauthorized content changes that could damage your reputation.

  • passive scan

    Scans applications and services passively to detect available vulnerabilities, exposed assets, or misconfigurations, all without interacting directly with the system.

  • Priority Action Plan

    Delivers a clear, step-by-step plan to address identified risks and strengthen your overall security posture.

  • Detailed Report

    Provides a comprehensive report on all findings, including vulnerabilities, threats, and actionable recommendations.

  • Up to 5-Hours Consultation

    Offers expert guidance on implementing the recommendations and addressing any security concerns identified in the assessment.

For organizations that require more in-depth threat analysis, with added layers of intelligence and risk detection.

price-icon1.png

Comprehensive

$ 7999 (exc GST)
  • recursive domain search

    Identifies all current and historical domains associated with your organization to ensure no assets are left unmonitored.

  • Subdomain reconnaissance

    Scans for active, hidden, and historical subdomains that may pose security risks due to lack of visibility or oversight.

  • Dark web search

    Searches the dark web for leaked credentials or sensitive information associated with your domains to prevent unauthorized access.

  • vulnerability threat intel

    Gathers information from public and private sources to identify vulnerabilities in your domain and subdomain infrastructure.

  • takeover assessment

    Assesses misconfigured or inactive subdomains to prevent attackers from gaining control over your online assets.

  • defacing assessment

    Monitors your domains and subdomains for unauthorized content changes that could damage your reputation.

  • passive scan

    Scans applications and services passively to detect available vulnerabilities, exposed assets, or misconfigurations, all without interacting directly with the system.

  • Priority Action Plan

    Delivers a clear, step-by-step plan to address identified risks and strengthen your overall security posture.

  • Detailed Report

    Provides a comprehensive report on all findings, including vulnerabilities, threats, and actionable recommendations.

  • Up to 5-Hours Consultation

    Offers expert guidance on implementing the recommendations and addressing any security concerns identified in the assessment.

For organizations looking for the most complete and thorough threat reconnaissance, including additional risk assessments and advanced scanning techniques.

  • Pricing Disclaimer

    Please note that the listed prices cover the discovery of up to 5 domains related to the provided domain and up to 20 subdomains for threat intelligence, passive scanning, and defacing assessments. For additional domains or subdomains, custom pricing will be provided based on the scope of the assessment.

  • Service Limitation Disclaimer

    This service is not a definitive security solution. All findings and recommendations are based on the information available from public and private intelligence sources, as well as passive scanning techniques. While we aim to provide comprehensive insights, certain risks and vulnerabilities may remain undetected due to the limitations of available data and the non-invasive nature of passive scans.