Skip to content Skip to main navigation Skip to footer

How do I analyze my attack surface?

The data in your Pentest-Tools.com dashboard can help you with 2 out of 3 key steps that reduce your network attack surface.

Step 1: Identify the most exposed entry points / assets an attacker could exploit to breach the network. These include:

  • open ports that shouldn’t be publicly accessible
  • outdated network service versions (e.g. outdated, exploitable server software)
  • internal network services exposed on the public network
  • old and forgotten web technologies, and more.

Step 2: Eliminate unnecessary pathways (e.g. close ports, retire unused services, etc.) and run recurring scans with tools on our platform to validate that your network’s attack surface was reduced. Analyze the same results to identify new open ports or outdated services, among other types of relevant data.

Best practices recommend network segmentation as Step 3, to further minimize a network’s attack surface. For in-depth information about the topic, check out OWASP’s cheat sheet.

Was This Article Helpful?

0

If you didn't find what you were looking for, browse the categories below or contact us now!

We'd really love to get you the answer you're looking for. If the article How do I analyze my attack surface? doesn't contain the information you're seeking, please get in touch with us directly:

Contact us »