External attack surface
Domains, subdomains, exposed services, forgotten staging environments, cloud assets outside your CMDB. Continuous verification rather than one-off scans.
INFORMATION GATHERING · OSINT
Every operation begins with reconnaissance. Often a structured look at your external attack surface is enough to identify the most dangerous open flanks — without ever firing an exploit. Book information gathering as a standalone service or as a precursor to a red team operation.
01 · SCOPE
Domains, subdomains, exposed services, forgotten staging environments, cloud assets outside your CMDB. Continuous verification rather than one-off scans.
Searching public and commercial leak databases for credentials, API keys, and internal documents belonging to your organisation and your suppliers.
Which employees are particularly attractive spear-phishing targets through LinkedIn, conference talks or code repositories? Which technologies do they unintentionally disclose?
Your attack surface does not end at your perimeter. We examine third-party integrations, SaaS trusts, and exposed CI/CD pipelines that reach into your environment.
02 · METHOD
We start fully passive from open sources — no packet you did not expect ever touches your perimeter. Only in a second phase, and only with explicit approval, do we perform active verification: service fingerprinting, authenticated paths, reachability checks. Every finding is prioritised by criticality, exploitability, and business impact — not CVSS alone.
03 · DELIVERABLE
You receive a prioritised attack-surface report with a concrete top list: what to take down immediately, what to harden, what to monitor. Every observation is documented with source, timestamp, and reproduction path. On request we deliver the result as a JSON feed into your asset or ticketing system.
KNOW WHAT ATTACKERS SEE
A one-off deep dive or continuous monitoring — we align the engagement to your maturity and tempo.