{"id":14967,"date":"2021-02-08T10:20:26","date_gmt":"2021-02-08T17:20:26","guid":{"rendered":"https:\/\/xerosecurity.com\/wordpress\/?p=14967"},"modified":"2022-08-09T07:17:26","modified_gmt":"2022-08-09T14:17:26","slug":"continuous-attack-surface-management-with-sn1per-professional","status":"publish","type":"post","link":"https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/","title":{"rendered":"Attack Surface Management With Sn1per Professional"},"content":{"rendered":"<p>External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right tools and processes in place is vital to detecting new vulnerabilities before attackers do. In this blog post, we will outline the basic steps for discovering the attack surface with <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a>.<\/p>\n<p><!--more--><\/p>\n<h4>Discover the External Attack Surface<\/h4>\n<p>Discovering the attack surface with <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> is easy. Simply enter the target domain name into the &#8220;Quick Commands&#8221; sections of the <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/command-execution-add-on-v2\/\" target=\"_blank\" rel=\"noopener\">Command Execution Add-on v2.0<\/a> for <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> and enable the &#8220;Recon&#8221; option to gather all sub-domains. Set a daily, weekly or monthly scan schedule to continuously scan the attack surface.<\/p>\n<div id=\"attachment_14990\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14990\" class=\"size-large wp-image-14990\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-1024x321.png\" alt=\"Sn1per-Professional-scheduled-discovery-scan2\" width=\"1024\" height=\"321\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-1024x321.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-800x251.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-300x94.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-768x241.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-1536x482.png 1536w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2-400x126.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-scheduled-discovery-scan2.png 1654w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-14990\" class=\"wp-caption-text\">Sn1per-Professional-scheduled-discovery-scan<\/p><\/div>\n<h4>Asset Inventory Management<\/h4>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> makes it easy to view the entire asset inventory or any target domain by clicking on the target workspace from the Workspace Navigator. This allows organizations to view all of their external facing assets and routinely scan for changes.<\/p>\n<div id=\"attachment_14974\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14974\" class=\"size-large wp-image-14974\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-1024x682.png\" alt=\"sn1per-professional-v9.0-attack-surface-discovery1\" width=\"1024\" height=\"682\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-1024x682.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-800x533.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-300x200.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-768x512.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-1536x1023.png 1536w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b-400x266.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery1b.png 1779w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-14974\" class=\"wp-caption-text\">sn1per-professional-attack-surface-discovery<\/p><\/div>\n<h4>Visibility and Risk Reduction<\/h4>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> provides an up-to-date view of your attack surface and provides an overall workspace vulnerability matrix and individual asset risk scores to find, prioritize and secure your entire attack surface. This is done by selecting the &#8220;All Domains&#8221; option from the &#8220;Multi-Target&#8221; drop down menu included with the <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/command-execution-add-on-v2\/\" target=\"_blank\" rel=\"noopener\">Command Execution Add-on v2.0<\/a> and clicking the &#8220;Scan&#8221; button.<\/p>\n<div id=\"attachment_14973\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14973\" class=\"wp-image-14973 size-large\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2-1024x697.png\" alt=\"sn1per-professional-v9.0-attack-surface-discovery2\" width=\"1024\" height=\"697\" \/><\/a><p id=\"caption-attachment-14973\" class=\"wp-caption-text\">sn1per-professional-attack-surface-discovery<\/p><\/div>\n<h4>Notifications and Change Auditing<\/h4>\n<p>Having a time-stamped log of key changes is vitally important when monitoring the attack surface. <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> makes this easy by letting you view the following notifications and changes directly from the UI without the need for external services such as e-mail, Slack or Discord:<\/p>\n<ul>\n<li>New domains discovered<\/li>\n<li>New URL&#8217;s discovered or changed<\/li>\n<li>Host status changes<\/li>\n<li>Host port changes<\/li>\n<li>Vulnerabilities discovered<\/li>\n<li>Scan status changes (ie. start\/finish)<\/li>\n<\/ul>\n<div id=\"attachment_14976\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14976\" class=\"size-large wp-image-14976\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-1024x845.png\" alt=\"sn1per-professional-v9.0-attack-surface-notifications1\" width=\"1024\" height=\"845\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-1024x845.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-800x660.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-300x248.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-768x634.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1-400x330.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-notifications1.png 1515w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-14976\" class=\"wp-caption-text\">sn1per-professional-attack-surface-notifications<\/p><\/div>\n<h4>Threat and Vulnerability Management<\/h4>\n<p>Scanning for the latest vulnerabilities and CVE&#8217;s is critical for any Attack Surface Management (ASM) service or software. With <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a>, it&#8217;s easy to scan for the latest vulnerabilities and generate PDF, CSV, TXT or XLS vulnerability reports. Quickly sort and filter by criticality, vulnerability name, target or evidence to quickly find the data you&#8217;re looking for.<\/p>\n<div id=\"attachment_14975\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-vulnerability-report1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14975\" class=\"size-large wp-image-14975\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-vulnerability-report1-1024x830.png\" alt=\"sn1per-professional-v9.0-attack-surface-vulnerability-report1\" width=\"1024\" height=\"830\" \/><\/a><p id=\"caption-attachment-14975\" class=\"wp-caption-text\">sn1per-professional-attack-surface-vulnerability-report<\/p><\/div>\n<h4>More Info<\/h4>\n<p>This blog post outlines the basic steps to discover the attack surface using <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a>. To find out how Sn1per Professional can help you or your organization perform Attack Surface Management, check our latest <a href=\"https:\/\/www.youtube.com\/watch?v=bsUvB4Vca7Y&amp;list=PL40Vp978dDP9KX2V3VLnNzgJuf4nJrRo9\">demo<\/a> video and blog post <a href=\"https:\/\/sn1persecurity.com\/wordpress\/sn1per-professional-v10-released\/\">here<\/a>. If you&#8217;re looking for a free and open source option to perform attack surface monitoring, try our <a href=\"https:\/\/github.com\/1N3\/Sn1per\" target=\"_blank\" rel=\"noopener\">Sn1per Community Edition<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/bsUvB4Vca7Y?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent&#038;listType=playlist&#038;list=PL40Vp978dDP9KX2V3VLnNzgJuf4nJrRo9\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Get Your Copy Today!<\/a><\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div style=\"position: static !important;\"><\/div>\n<div style=\"position: static !important;\"><\/div>\n<div id=\"wp-share-button-14967\" class=\"wp-share-button theme28\"><span class=\"total-share \"><i class=\"total-count-text\">Total Share<\/i> <i class=\"total-count\">42<\/i> <\/span><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/\" class=\"share-button share-button-14967 facebook\" id=\"facebook\" data-nonce=\"79e3a6a4d6\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Facebook<\/span>\r\n\r\n<span class=\"button-count\">19<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/&#038;text=Attack%20Surface%20Management%20With%20Sn1per%20Professional\" class=\"share-button share-button-14967 twitter\" id=\"twitter\" data-nonce=\"79e3a6a4d6\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Twitter<\/span>\r\n\r\n<span class=\"button-count\">6<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"http:\/\/www.reddit.com\/submit?title=Attack%20Surface%20Management%20With%20Sn1per%20Professional&#038;url=https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/\" class=\"share-button share-button-14967 reddit\" id=\"reddit\" data-nonce=\"79e3a6a4d6\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Reddit<\/span>\r\n\r\n<span class=\"button-count\">9<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/&#038;title=Attack%20Surface%20Management%20With%20Sn1per%20Professional&#038;summary=&#038;source=\" class=\"share-button share-button-14967 linkedin\" id=\"linkedin\" data-nonce=\"79e3a6a4d6\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Linkedin<\/span>\r\n\r\n<span class=\"button-count\">5<\/span>\r\n\r\n<\/a>\r\n\r\n<a title=\"More...\" href=\"#wp-share-button-14967\" class=\"share-button-more\"><span class=\"button-icon\"><i class=\"fa fa-plus\"><\/i><\/span><\/a><div class=\"wp-share-button-popup wp-share-button-popup-14967\"><div class=\"popup-buttons\"><span class=\"close\">X<\/span><a target=\"_blank\" href=\"mailto:?subject=Attack%20Surface%20Management%20With%20Sn1per%20Professional&#038;body=https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/\" class=\"share-button share-button-14967 email\" id=\"email\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Email<\/span>\r\n<span class=\"button-count\">2<\/span>\t\t\t\t\r\n\r\n<\/a>\r\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16534,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[290,80,184,289],"tags":[137,180,41,265,264,106,61,267,52,92,116,259,266,172,39,95,38,40,262,268,37,285,181,263,261,260,70,108,36],"class_list":["post-14967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack-surface-management","category-bug-bounties","category-news","category-penetration-testing","tag-0day","tag-attack","tag-bugbounty","tag-cast","tag-continuous","tag-cve","tag-demo","tag-digital","tag-exploit","tag-exploitation","tag-hacking","tag-management","tag-modern","tag-osint","tag-pentest","tag-pentesting","tag-professional","tag-recon","tag-red","tag-reduction","tag-sn1per","tag-sn1persecurity","tag-surface","tag-team","tag-test","tag-testing","tag-video","tag-vulnerability","tag-xer0dayz"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png","jetpack_shortlink":"https:\/\/wp.me\/pdnW96-3Tp","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":19913,"url":"https:\/\/sn1persecurity.com\/wordpress\/external-attack-surface-management-with-sn1per\/","url_meta":{"origin":14967,"position":0},"title":"External Attack Surface Management with Sn1per","author":"xer0dayz","date":"September 12, 2022","format":false,"excerpt":"In the world of cybersecurity, it's important to constantly be on the lookout for new threats. One way to do this is by keeping an eye on your organization's external attack surface. Your external attack surface is the sum total of all the ways a hacker could potentially gain access\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"External Attack Surface Management with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20085,"url":"https:\/\/sn1persecurity.com\/wordpress\/5-ways-sn1per-can-automate-your-security-workflow\/","url_meta":{"origin":14967,"position":1},"title":"5 Ways Sn1per Can Automate Your Security Workflow","author":"xer0dayz","date":"September 20, 2022","format":false,"excerpt":"If you're in the security field, you know that there are a lot of moving parts to keep track of. It can be tough to stay on top of everything, and even tougher to find the time to do it all manually. That's where Sn1per comes in - it's a\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Automate Your Security Workflow with Sn1per","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":15445,"url":"https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/","url_meta":{"origin":14967,"position":2},"title":"Passive Reconnaissance Techniques For Penetration Testing","author":"xer0dayz","date":"April 19, 2021","format":false,"excerpt":"As a top ranked bug bounty researcher and Sr. Penetration Tester, I've discovered some critical vulnerabilities without ever directly accessing or scanning the target in question. These vulnerabilities are typically found by querying 3rd party services to discover cached and historic URL's from a target and searching interesting URL's. In\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Passive Attack Surface Reconnaissance","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22488,"url":"https:\/\/sn1persecurity.com\/wordpress\/dark-web-monitoring-securing-your-external-attack-surface\/","url_meta":{"origin":14967,"position":3},"title":"Dark Web Monitoring: Securing Your External Attack Surface","author":"xer0dayz","date":"May 4, 2023","format":false,"excerpt":"In today's digital era, data breaches and cyber-attacks are increasing day by day, and with the increasing amount of data being stored and transmitted online, the threat is real. Hackers and cybercriminals are constantly looking for vulnerabilities to exploit in your organization's system. With the advent of the dark web,\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Dark Web Monitoring","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22981,"url":"https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/","url_meta":{"origin":14967,"position":4},"title":"Attack Surface Management Platform &#8211; Enhancing Your Security","author":"xer0dayz","date":"January 15, 2023","format":false,"excerpt":"In today's rapidly evolving digital landscape, ensuring the security of your organization's data and infrastructure is of utmost importance. With the increasing number of cyber threats and vulnerabilities, it has become essential for businesses to proactively manage their attack surface. This is where an Attack Surface Management (ASM) platform comes\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"External Attack Surface Management with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17958,"url":"https:\/\/sn1persecurity.com\/wordpress\/spring4shell-cve-2022-22965-detection-with-sn1per-professional\/","url_meta":{"origin":14967,"position":5},"title":"Spring4Shell (CVE-2022-22965) Detection with Sn1per Professional","author":"xer0dayz","date":"April 11, 2022","format":false,"excerpt":"On March 30, 2022, information regarding a critical 0-day vulnerability affecting the Spring Framework was disclosed and dubbed \"Spring4Shell\" CVE-2022-22965 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per-Spring4Shell-Scanner1","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/14967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=14967"}],"version-history":[{"count":46,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/14967\/revisions"}],"predecessor-version":[{"id":19384,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/14967\/revisions\/19384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media\/16534"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=14967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/categories?post=14967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/tags?post=14967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}