2. Performing Cybersecurity Evaluations
OSINT Analysis Scan in Cyber Security
Perform an OSINT Analysis scan gather intelligence and identify potential vulnerabilities for a domain.
- Log In to the Platform
- Use your credentials to log in to the platform.
 
 - Navigate to the Cyber Security Section
- Locate the Side Navigation Bar on the left side of the screen.
 - Select the Cyber Security tab to access its features.
 
 - Select OSINT Scan
- Within the Cyber Security section, find and click on the OSINT Scan option.
 
 
- Enter the Domain
- In the OSINT Scan input field, type the domain you want to scan (e.g., example.com).
 
 - Initiate the Scan
- Click the Scan button to start the OSINT scan for the entered domain.
 
 

- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
 
 - Monitor scan progress, and upon completion, a report will be generated then open it.
 
- 
- Once the scan is complete, detailed results will be displayed for analysis.
 - Use the results to identify potential vulnerabilities or gather intelligence on the domain.
 
 
DAST Scan in Cyber Security
Conduct a dynamic application security test (DAST) to detect vulnerabilities in a web application.
- Log In to the Platform
- Use your credentials to log in to the platform.
 
 - Navigate to the Cyber Security Section
- Locate the Side Navigation Bar on the left-hand side.
 - Click on the Cyber Security tab to access its features.
 
 - Select the DAST Scan Option
- In the Cyber Security section, find and click on the DAST Scan option.
 
 
- Enter the Domain
- In the DAST Scan input field, type the domain you want to scan (e.g., example.com).
 
 - Choose the Type of Scan
- Select the type of scan based on your needs:
- Basic Scan: Performs a general security assessment of the domain.
 - Advanced Scan: Conducts a thorough and detailed security evaluation with advanced checks.
 
 
 - Select the type of scan based on your needs:
 - Initiate the Scan
- Once you’ve selected the scan type, click the Scan button corresponding to your chosen option to begin.
 
 
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
 
 

- 
- After the scan is complete, detailed results will be displayed for review.
 - Analyze the findings to identify vulnerabilities and take necessary actions.
 
 
                




