Skip to main content

Performing Cyber Security Evaluations

OSINT Analysis Scan in Cyber Security

Perform an OSINT Analysis scan to gather intelligence and identify potential vulnerabilities for a domain.

  • Log In to the Platform
    • Use your credentials to log in to the platform.
  • Navigate to the Cyber Security Section
    • Locate the the Side Navigation Bar on the left side of the screen.
    • Select the the Cyber Security tab to access its features.
  • Select OSINT Analysis Scan
    • Within the the Cyber Security section, Select OSINT OSINT Analysis .

image.png

  • Enter the Domain
    • In the the OSINT Scan input field, type the domain you want to scan (e.g., example.com).
  • Initiate the Scan
    • Click the the Scan button to start the OSINT scan for the entered domain.

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open it.

image.png

    • Once the scan is complete, detailed results will be displayed for analysis.
    • Use the results to identify potential vulnerabilities or gather intelligence on the domain.

image.png

DAST Scan in Cyber Security

Conduct a Dynamic Application Security Test (DAST) to detect vulnerabilities in a web application.

  • Log In to the Platform
    • Use your credentials to log in to the platform.
  • Navigate to the Cyber Security Section
    • Locate the the Side Navigation Bar on the left-hand side.
    • Click on the the Cyber Security tab to access its features.
  • Select the DAST Scan Option
    • In the the Cyber Security section, Select DAST.

image.png

  • Enter the Domain
    • In the the DAST Scan input field, type the domain you want to scan (e.g., example.com).
  • Choose the Type of Scan
    • Select the type of scan based on your needs:
      • Basic Scan: Performs a general security assessment of the domain.
      • Advanced Scan: Conducts a thorough and detailed security evaluation with advanced checks.
  • Initiate the Scan
    • Click respective button to start scanning process

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open it.

image.png

    • After the scan is complete, detailed results will be displayed for review.
    • Analyze the findings to identify vulnerabilities and take necessary actions.

image.png

Web Directory Scan in Cyber Security

Perform a web directory scan to enumerate and analyze accessible directories on a domain.

  • Log In to the Platform
    • Enter your credentials to access the platform.
  • Navigate to the Cyber Security Section
    • Open the the Side Navigation Bar on the left-hand side.
    • Click on the the Cyber Security tab to access its features.
  • Select the Web Directory Scan Option
    • Within the the Cyber Security section, Select Web Directory.

image.png

  • Enter the Domain
    • In the the Web Directory Scan field, type the domain you want to scan (e.g., example.com).
  • Initiate the Scan
    • Click the Scan button and select appropriate tech stack and click on Proceed to start the Web Directory Scan.

image.png

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open it.

image.png

    • Once the scan is completed, detailed results will be available for review and analysis.

image.png

Network Security Scan in Cyber Security

Conduct a network security scan to identify vulnerabilities, misconfigurations, and potential threats.

  • Log In to the Platform
    • Enter your your username and password to access the platform.
  • Navigate to the Cyber Security Section
    • Open the the Side Navigation Bar located on the left-hand side.
    • Click on the the Cyber Security tab to access its tools and features.
  • Select the Network Security Scan Option
    • Within the the Cyber Security section, Select Network Security.

image.png

  • Enter the Domain
    • In the the Network Security Scan field, type the domain you want to scan (e.g., example.com or IP Address)
  • Initiate the Scan
    • Click the the Scan button to begin the Network Security Scan.

image.png

  • Monitor and Review Results
    • Monitor scan progress, and upon completion, a report will be generated then open it.

image.png

    • Once the scan is complete, detailed results will be displayed for:
      • Identified vulnerabilities
      • Network misconfigurations
      • Potential threats

image.png

Note:

  • For accessing historic reports or addressing scan failures, refer to the Report History Page for further details and View error.