System Overview

System Overview

Storm XASM is a strong External Attack Surface Management (EASM) platform that provides organizations with continuous visibility into every external side of their digital footprint. Covering everything from subdomains and web applications to network configurations, it performs a thorough assessment of external assets, helping organizations identify vulnerabilities that could be exploited by attackers.

Through ongoing mapping and monitoring of these external assets, XASM offers proactive insights that strengthen security posture, lower the risk of data breaches, and help prevent potential cyber-attacks. The platform is organized into three main modules, each designed to challenge specific components of the external attack surface.

Attack Surface Discovery

The Attack Surface Discovery module is helping organizations keep track of all their external assets. It ensures that nothing goes unnoticed, scanning each asset for possible vulnerabilities. Key features include:

  • Asset Inventory: Creates a complete list of all publicly accessible assets, like subdomains and IP addresses.

  • External Vulnerability Scans: Automatically checks these assets for weaknesses hackers could exploit.

  • Public Repository Leaks: Scans public repositories, for accidental data exposures.

  • GitHub Leak Detection: Monitors public sources for exposed credentials, tokens, and other sensitive information, notifying potential data leaks.

  • Social Data Scanning: Analyzes publicly available data about the employees of the organization and automates phishing attacks to identify possible

Web Application Scanning

This module focuses on protecting web applications by identifying vulnerabilities that could lead to unauthorized access or data leaks. It helps security teams keep web-facing apps secure by:

  • Vulnerability Scans: Identifies weak spots in web applications.

  • Subdomain Mapping: Identifies all subdomains to ensure comprehensive security across every entry point.

  • Application Crawling: Carefully explores applications to identify all potential entry points for a complete security view.

  • Cryptographic Vulnerabilities Identification: Detects weaknesses in cryptographic implementations, ensuring that encryption and data protection mechanisms are secure against potential attacks.

  • Third-Party Libraries Scanning: Scans 3rd party libraries and dependencies for known vulnerabilities in the different web applications, helping organizations identify risks associated with third-party software components.

Network Scanning

The Network Scanning module focuses on identifying vulnerabilities and misconfigurations in assets with Public IPs—a critical step to prevent unauthorized access. It provides a detailed view of network security by:

  • Vulnerability Scans: Finds security gaps within the network that attackers might exploit.

  • Misconfiguration Checks: Detects configuration errors that could expose the network to threats.

  • Port Scanning & Host Discovery: Maps open ports and identifies network hosts, enabling teams to close unnecessary access points.

  • Service & OS Identification: Provides insights into services and operating systems in use, flagging outdated or unsupported versions that could pose risks.

Last updated