Getting started

Knowledge hub

Tutorials

Concepts

Asset Discovery & Vulnerability Scanning

This workflow is designed to identify vulnerabilities and gather information about the technologies and web servers in an infrastructure. It produces several output files, including a list of vulnerabilities ranked by severity, a list of open ports, details about the technologies used in the infrastructure, a list of available web servers, and a zip file containing screenshots of those web servers. These outputs can be used to assess the security of the infrastructure and identify any potential weaknesses that may need to be addressed.

Complexity: advanced

Category: Attack Surface Management

Workflow

Asset Discovery & Vulnerability Scanning

Tools

Setup

You can set up this workflow by changing following input values:

Workflow Targets Setup

Execution and results

After setup workflow is ready to be executed. Once workflow’s last node, report script, is finished result can be viewed and downloaded.

report script node will contain the following files:

  • nuclei.json - output of nuclei containing all of the vulnerabilities connected to parameter severity used as input to the workflow
  • open-ports.txt - output of naabu with all of the ports open from hostnames found in the current run
  • technologies.json - output of webanalyze-1 containing the valuable info about the infrastructure technologies from hostnames found in the current run
  • webservers.json - all of the available web servers from httpx
  • results.zip - eyeballer output containing all screenshots from found web servers

Try it out!

This workflow is available in the Library, you can copy it and execute it immediately!