Skip to main content
Use Exposure to identify weaknesses in internet-facing infrastructure before attackers exploit them.
  1. Choose the target domain.
  2. Review Subdomains to validate inventory.
  3. Review Open ports to identify reachable services.
  4. Review Vulnerabilities and CVEs for risk prioritization.

Operational tips

  • Start from asset inventory, then drill down into vulnerabilities.
  • Use CVE details and references to support remediation planning.
  • Pivot from CVEs to affected hosts to align ownership quickly.