How to navigate the EASM Page in Edgescan

The EASM Page in Edgescan is your central hub for conducting and reviewing cybersecurity assessments of your organization's external attack surface.

Version Number: v1.0.1

Published Date: 13 May 2024

____________________________________________________________________________

Located at the top of the page is the "Investigations" section, where the latest investigation summary is prominently showcased through informative visuals.

This summary offers a quick overview of key findings, such as:

  • Domains Found: Total count of unique domains identified.
  • Records Found: Various DNS records revealed during the investigation.
  • Services Found: Services detected running across the identified domains.
  • Certificates Found: SSL/TLS certificates obtained, indicating secure connections.

Below the investigation summary, circle graphs visually depict the coverage of application, network, and overall attack surface management, including:

  • App Coverage: The percentage of applications included in the investigation.
  • Net Coverage: Analysis of network elements.
  • ASM Coverage: The scope of external attack surface management.
  • Total Coverage: An overall view of the investigation coverage.
investigationsummary

Actionable Icons

Adjacent to the visuals, action icons facilitate direct engagement with the platform's features, allowing you to (in order):

  • Start a New Scan: Initiate an immediate scan of your external attack surface.

  • Schedule a Scan: Set up future scans at regular intervals.

  • View Investigation Stream: Access real-time updates and activities of ongoing investigations.

  • View Investigation Results: Review detailed findings from completed investigations.

  • Delete Investigation: Remove an investigation from your records

actioable icons

Build your EASM Investigation

Within this section, we will delve into two distinct methods for setting up our EASM (External Attack Surface Management) investigation: the Simple Setup and the Advanced Setup. Opting for the Simple Setup only requires a target domain to kick off the scan, making it a user-friendly choice for those looking for a straightforward process. On the flip side, the Advanced Setup involves more intricate configurations but provides a wider coverage across different task types, catering to users in need of a more thorough analysis.

adding target

Setup Tasks

The Investigations page provides a detailed breakdown of tasks involved in the investigation, categorised as either "Required" or "Optional":

Feature Feature Description Requirements
Brute-force Subdomain Enumeration Uses a brute-force approach to guess potential subdomains of target domains Required
Last Registrant Retrieval Retrieves the last (most recent) registrant of a domain Required
DNS Resolution Resolves the DNS records of a domain Required
Subdomain discovery Discovers subdomains of target domains by querying publicly available resources like search engines and social media Required
Domain Registration Exploration Finds domains that are registered or have been registered in the past by the same entity that registered a target domain Optional
Service Discovery Discover open ports and running services on discovered domains Optional
HTTP Defensive Header Grading Grade defensive headers for http and https services. Defensive headers include Content-Security-Policy, X-Content-Type-Options, X-Frame-Options, X-XSS-Protection, and Referrer-Policy Optional
Certificate Retrieval Retrieves certificates for domains and reports their validity and expiration dates Optional
HTTP(s) Probe Probe HTTP(s) service availability and status. Note that this is redundant if you are also using the Service Discovery task. It is offered as a lightweight alternative for situations where port scanning would not be appropriate Optional
Typosquatting and Similar Domain Discovery Reports domains that are lexicographically similar to target domains. This can help identify typosquatting and domains using other TLDs with the same name. Note that this task can take a long time to complete and may generate a lot of noise Optional

Regexes

Regex, short for 'Regular Expression', is a tool for matching patterns in text. It acts as a powerful filter for specific string patterns.

While a comprehensive guide to Regex syntax is beyond this manual, we encourage further exploration online. This guide uses the Ruby style of Regex, known for its specific syntax rules. Tools like Rubular, a Ruby regular expression editor, are recommended for testing and ensuring correct syntax.

Example: For the regex 'edgescan', matches include 'http://edgescan.com ' and '123edgescan.com', but not 'edge123scan.com' or 'edge.scan.com'.

Setup Schedule

You can easily schedule scans to fit any timeframe. For example, a monthly scan is set to begin on February 22nd. Our scheduling options are flexible, including daily, weekly, monthly intervals, and more, allowing for customized investigations that meet your specific requirements.

setup schedule

Investigation Stream

The interface of the EASM tool, known as the 'Investigation Stream,' is showcased in the screenshot below. This feature allows users to monitor a stream of results that includes new domains, records, services, and registrants. On the left side, a summary presents key statistics such as 21 domains, 70 records, 3 services, and 0 certificates that have been identified.
investigation stream

The interface is interactive, offering options to filter the stream by domains, records, services, and registrants. An ongoing scan is indicated in the example, with 193 scan events recorded and 144 registrants discovered. The right side of the interface displays newly found domains and records, showcasing the progress of the active investigation.