Skip to main content

2. Performing Cybersecurity Evaluations

OSINT Analysis Scan in Cyber Security

Perform an OSINT Analysis scan gather intelligence and identify potential vulnerabilities for a domain.

  • Log In to the Platform
    • Use your credentials to log in to the platform.
  • Navigate to the Cyber Security Section
    • Locate the Side Navigation Bar on the left side of the screen.
    • Select the Cyber Security tab to access its features.
  • Select OSINT Scan
    • Within the Cyber Security section, find and click on the OSINT Scan option.

image.png

  • Enter the Domain
    • In the OSINT Scan input field, type the domain you want to scan (e.g., example.com).
  • Initiate the Scan
    • Click the Scan button to start the OSINT scan for the entered domain.

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open itit.

image.png

    • Once the scan is complete, detailed results will be displayed for analysis.
    • Use the results to identify potential vulnerabilities or gather intelligence on the domain.

image.png

DAST Scan in Cyber Security

Conduct a dynamic application security test (DAST) to detect vulnerabilities in a web application.

  • Log In to the Platform
    • Use your credentials to log in to the platform.
  • Navigate to the Cyber Security Section
    • Locate the Side Navigation Bar on the left-hand side.
    • Click on the Cyber Security tab to access its features.
  • Select the DAST Scan Option
    • In the Cyber Security section, find and click on the DAST Scan option.

image.png

  • Enter the Domain
    • In the DAST Scan input field, type the domain you want to scan (e.g., example.com).
  • Choose the Type of Scan
    • Select the type of scan based on your needs:
      • Basic Scan: Performs a general security assessment of the domain.
      • Advanced Scan: Conducts a thorough and detailed security evaluation with advanced checks.
  • Initiate the Scan
    • Once you’ve selected the scan type, click the Scan button corresponding to your chosen option to begin.

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open it.

image.png

    • After the scan is complete, detailed results will be displayed for review.
    • Analyze the findings to identify vulnerabilities and take necessary actions.

image.png