Improvements to fingerprinted technologies, IP data, and the attack surface


We’ve made several improvements to how users can interact with their fingerprinted technologies data, grouping IP data by several parameters, and viewing the latest changes to their expanding attack surface.

The fingerprinted technologies page gets an overhaul

We now highlight new data about what you are hosting across your attack surface by revamping the fingerprinted technologies page. We have also introduced powerful ways to search and filter your technology data. This page now reflects how users interact with grouping data on the IP, which we hope makes using Detectify more seamless.  

Improvements to the fingerprinted technologies page are:

  • New filters with suggestions based on your attack surface
  • View what port and protocol we requested
  • We now show when a fingerprinted technology was discovered on a specific asset and if it has disappeared

Group IP data by hosting provider and country

Viewing which countries and hosting providers you use across your attack surface is now possible. You can view this data by grouping your IP data by country and provider. Grouping IP data in this way will help you spot potential exposures, such as an unapproved hosting provider in a geography your organization doesn’t commonly use.

We will now present essential changes to your attack surface from the overview page when logging into Detectify. Highlighted changes include all newly added countries and hosting providers not previously discovered on your attack surface.

New workflow for investigating grouped IP data 

We’ve simplified how users see which assets and IPs are found for a hosting provider or country from the group by page. Users can do this by clicking the aggregated sum. This will take you to the group by none view, explicitly filtered for that provider or country.

Additional product updates:

  • We’ve rearranged the submenu under the Attack Surface header on the left-hand menu to list “All Assets” and “Root Assets” first, followed by IP Addresses and Technologies.
  • We’ve removed the charts found on the IP Addresses page.
  • We’ve removed the “Add asset” and “Expand your coverage” buttons from the IP Addresses and Technologies pages.
  • The feature automatically marking your findings as “Fixed” has been re-enabled. Automated marking of fixed vulnerabilities will help you organize vulnerabilities that Detectify can no longer find to reduce noise on your attack surface.

We publish product release notes every few weeks on our blog. If you’d like to review the latest releases to Detectify as they are shipped, follow this link to sign up to get notified: https://changes.detectify.com/en.



Source link