Performing Cyber Security Evaluations
OSINT Analysis Scan in Cyber Security
Perform an OSINT Analysis scan to gather intelligence and identify potential vulnerabilities for a domain.
- Log In to the Platform
- Use your credentials to log in to the platform.
- Navigate to the Cyber Security Section
- Locate
thethe Side Navigation Bar on the left side of the screen. - Select
thethe Cyber Security tab to access its features.
- Locate
- Select OSINT Analysis Scan
- Within
thethe Cyber Security section, SelectOSINTOSINT Analysis .
- Within
- Enter the Domain
- In
thethe OSINT Scan input field, type the domain you want to scan (e.g., example.com).
- In
- Initiate the Scan
- Click
thethe Scan button to start the OSINT scan for the entered domain.
- Click

- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
- Monitor scan progress, and upon completion, a report will be generated then open it.
-
- Once the scan is complete, detailed results will be displayed for analysis.
- Use the results to identify potential vulnerabilities or gather intelligence on the domain.
DAST Scan in Cyber Security
Conduct a Dynamic Application Security Test (DAST) to detect vulnerabilities in a web application.
- Log In to the Platform
- Use your credentials to log in to the platform.
- Navigate to the Cyber Security Section
- Locate
thethe Side Navigation Bar on the left-hand side. - Click on
thethe Cyber Security tab to access its features.
- Locate
- Select the DAST Scan Option
- In
thethe Cyber Security section, Select DAST.
- In
- Enter the Domain
- In
thethe DAST Scan input field, type the domain you want to scan (e.g., example.com).
- In
- Choose the Type of Scan
- Select the type of scan based on your needs:
- Basic Scan: Performs a general security assessment of the domain.
- Advanced Scan: Conducts a thorough and detailed security evaluation with advanced checks.
- Select the type of scan based on your needs:
- Initiate the Scan
- Click respective button to start scanning process
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.

-
- After the scan is complete, detailed results will be displayed for review.
- Analyze the findings to identify vulnerabilities and take necessary actions.
Web Directory Scan in Cyber Security
Perform a web directory scan to enumerate and analyze accessible directories on a domain.
- Log In to the Platform
- Enter your credentials to access the platform.
- Navigate to the Cyber Security Section
- Open
thethe Side Navigation Bar on the left-hand side. - Click on
thethe Cyber Security tab to access its features.
- Open
- Select the Web Directory Scan Option
- Within
thethe Cyber Security section, Select Web Directory.
- Within

- Enter the Domain
- In
thethe Web Directory Scan field, type the domain you want to scan (e.g., example.com).
- In
- Initiate the Scan
- Click the Scan button and select appropriate tech stack and click on Proceed to start the Web Directory Scan.
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
-
- Once the scan is completed, detailed results will be available for review and analysis.
Network Security Scan in Cyber Security
Conduct a network security scan to identify vulnerabilities, misconfigurations, and potential threats.
- Log In to the Platform
- Enter
youryour username and password to access the platform.
- Enter
- Navigate to the Cyber Security Section
- Open
thethe Side Navigation Bar located on the left-hand side. - Click on
thethe Cyber Security tab to access its tools and features.
- Open
- Select the Network Security Scan Option
- Within
thethe Cyber Security section, Select Network Security.
- Within

- Enter the Domain
- In
thethe Network Security Scan field, type the domain you want to scan (e.g., example.com or IP Address)
- In
- Initiate the Scan
- Click
thethe Scan button to begin the Network Security Scan.
- Click
- Monitor and Review Results
- Monitor scan progress, and upon completion, a report will be generated then open it.
-
- Once the scan is complete, detailed results will be displayed for:
- Identified vulnerabilities
- Network misconfigurations
- Potential threats
- Once the scan is complete, detailed results will be displayed for:
Note:
- For accessing historic reports or addressing scan failures, refer to the Report History Page for further details and View error.












