Pentera Surface
About the product
Pentera Surface is a module that allows you to test the external attack surface of your organization. It allows you to determine your company’s full exposure on the Internet – i.e., all publicly visible addresses, services, domains, and applications – and then perform controlled tests of these elements for vulnerabilities. Pentera Surface runs continuously, using OSINT techniques to map external assets (e.g., open port scanning, related domain search, certificate analysis) and update them regularly (Attack Surface Management Solutions by Pentera). This allows the module to detect new or modified assets that could have been overlooked (so-called shadow IT). After gathering information about the assets, Pentera Surface launches secure simulated attacks against the detected targets – e.g., it tests web applications for common OWASP Top 10 vulnerabilities, checks the configurations of services available from the Internet, looks for configuration data leaks, weak passwords, etc. All activities are performed with caution so as not to disrupt services (the module is implemented in accordance with the safe by design methodology). An image of potential external attack vectors is generated, along with a priority list of vulnerabilities that need to be eliminated in order to strengthen perimeter defense.
Pentera Surface is particularly useful for continuously monitoring an organization’s attack surface from the Internet. It is used for early detection of configuration errors and vulnerabilities in publicly accessible systems – before cybercriminals do. This module helps security teams answer the questions: “What does a potential attacker see when looking at my organization from the outside?” and “Which of our public systems are most vulnerable?” In practice, Pentera Surface replaces or complements periodic tests such as External Penetration Tests or Attack Surface Monitoring services provided by external companies, giving the company ongoing control over its own exposure. It is also a useful tool when implementing new online services – before they are published, you can automate checks to ensure that they do not contain common vulnerabilities.