Loading...
Text copied to clipboard.

Node Inspector

close

Active Node

Connected Nodes

content_copy

Discovery Details

Search, sort or download results.

Ports Discovery Details

Search, sort or download results.

Vulners

Search, sort or download results.

Vuln NSE Script Details

Search, sort or download results.

device_hub

Subdomains

-

radio_button_unchecked

URLs

-

radio_button_checked

IPs

-

mail_outline

Emails

-

Issues

Count of main findings.

Discovery Alerts

Signatures that were activated during web discovery.

Top 20 Discovery Alerts Per IP

Count of the top 20 ips that generated more alerts.

HTTP Status Codes

Statistical distribution of response codes.

Apps HTTP & HTTPS

Statistical distribution of http protocols.

Top Technologies

Count of the top 20 technologies used.

Top IP Addresses

Count of the top 20 IP addresses.

Top Web Titles

Count of the top 20 web titles.

Top Servers

Count of the top 20 servers.

Top Cookies

Count of the top 20 cookies.

Top Header Types

Count of the top 20 header types.

Services

Distribution of discovered services.

Insecure Protocols

HTTP, SMTP, FTP, Telnet, POP3, HTTP-proxy.

Top Ports Per IP

Count of the top 20 ports per ip.

Top Ports

Count of the top 20 ports.

Top Products

Count of the top 20 products.

Top Cpe

Count of the top 20 cpe.

Risks

Statistical distribution of risks.

States

Statistical distribution of states.

SSL PCI Compilance

PCI only permits from TLS1.2v.

SSL/TLS Protocols

Accepted TLS protocols.

Top TLS Services

Count of the top 20 ports of services that offer TSL.

Top Insecure Ciphers

Count of the top 20 insecure ciphers.

Targets By Country

Geographical distribution of IP addresses by country.

Targets By City

Geographical distribution of IP addresses by city.

Leaked Emails Accounts

Information obtained according to 'Have I Been Pwned'.

Emails On Social Media

Email activity on social media.

Pwned Accounts

Accounts that are compromised with the leaked or guessable password.

Screenshots

Visual enumeration.

SSL - PCI Compliance

It is recommended to disable the listed ciphers and only allow TLSv1.2 or higher.

GeoIP

Physical location of IP addresses.

Services Matrix

Active services per ip.

WAF Detection

Detection of Web Application Firewalls per IP.

Shared Hosting

Websites found on the same hostname.

Mail Leaks

Checks for leaks of the company's email addresses in deep web and dark web databases.

Executive Report

Findings and recommendations.

ASV Table

ASV PCI Scan.

ASV Details Table

ASV PCI Scan Details

Burp Suite

Result Details

Surface Summary

Findings, implications, and recommended mitigation strategies.

Impact Analysis: TCP/IP Response Time Variations

Evaluation of response time deviations caused by security testing, measured with independent monitoring nodes.

Total Response Time of TCP/IP Connections - Port 80
TCP/IP Response Time - Port 80

Total Response Time of TCP/IP Connections - Port 443
TCP/IP Response Time - Port 443

Events Logs

Summary