Search, sort or download results.
Search, sort or download results.
Search, sort or download results.
Search, sort or download results.
Count of main findings.
Signatures that were activated during web discovery.
Count of the top 20 ips that generated more alerts.
Statistical distribution of response codes.
Statistical distribution of http protocols.
Count of the top 20 technologies used.
Count of the top 20 IP addresses.
Count of the top 20 web titles.
Count of the top 20 servers.
Count of the top 20 cookies.
Count of the top 20 header types.
Distribution of discovered services.
HTTP, SMTP, FTP, Telnet, POP3, HTTP-proxy.
Count of the top 20 ports per ip.
Count of the top 20 ports.
Count of the top 20 products.
Count of the top 20 cpe.
Statistical distribution of risks.
Statistical distribution of states.
PCI only permits from TLS1.2v.
Accepted TLS protocols.
Count of the top 20 ports of services that offer TSL.
Count of the top 20 insecure ciphers.
Geographical distribution of IP addresses by country.
Geographical distribution of IP addresses by city.
Information obtained according to 'Have I Been Pwned'.
Accounts that are compromised with the leaked or guessable password.
Visual enumeration.
It is recommended to disable the listed ciphers and only allow TLSv1.2 or higher.
Physical location of IP addresses.
Active services per ip.
Detection of Web Application Firewalls per IP.
Checks for leaks of the company's email addresses in deep web and dark web databases.
Findings and recommendations.
ASV PCI Scan.
ASV PCI Scan Details
Result Details
Findings, implications, and recommended mitigation strategies.
Evaluation of response time deviations caused by security testing, measured with independent monitoring nodes.
Summary
Emails On Social Media
Email activity on social media.