Reconnaissance is the initial planning stage of an attack, a penetration test or a red teaming campaign. During this phase, an attacker performs a comprehensive technical analysis on their target organization in addition to gathering employee and organizational intelligence that can be used in a social engineering attack or to gain illicit network access. Cymulate Attack Surface Manager lets you know what a hacker might know before they know it.
The Cymulate Recon module continuously scans the internet for information that an adversary can find and use before launching an attack. The module can scan for intelligence on your company, 3rd party supply chain or a target for a merger or acquisition. It scans domains and sub-domains for application and infrastructure vulnerabilities, web misconfigurations and open ports, it also searches open sources for leaked credentials, compromised passwords, darknet presence, employee emails, and other exploitable intelligence that an attacker may use to their advantage.
The Recon module alerts the security operations team when newly found intelligence is discovered, enabling them to mitigate vulnerabilities and reduce their cyber exposure.
Key Features
The Recon module is continuous, new findings trigger alerts for immediate attention.
Findings include both technical and organizational findings.
Third-Party Assessments–customers can assess potential business partners before engaging with them.
Simple mitigation and remediation steps are provided together with a complete view of the findings.