#
Ports
Ports are one of the single largest risks to your attack surface. Every piece of computing technology on your attack surface is exposed through a TCP or UDP port, and is the beginning of a potentially complex series of steps to attack your company. NetSPI discovers internet-facing ports by performing full TCP connect port scanning against all IP addresses discovered on your attack surface.
UDP ports are not currently covered in attack surface scanning but may be manually discovered and exploited by our Attack Surface Management Operations Team.
#
Accessing the Ports Page
The Ports page can be accessed from the following locations in ASM:
- Attack Surface Dashboard -> Open Ports
- Assets -> Ports
- Exposures -> Ports
#
Filter Ports and View CVEs
- Select any criteria in the inner sidebar filter
to narrow the Ports table
results.
- If any port has a CVE (common vulnerabilities and exposures) associated with it, the name and instance count of that CVE vulnerability or exposure display as filter options.
Select any Ports table row to display port details in the right pane
. A port screenshot (if available), information, all associated CVEs, and the discovery chain for the port display.
Select any CVE in the port details pane, or hover over any row in the Ports table to display and select the View Details icon
, to display the Port details page.
Here you can:
- Search and filter the CVEs for the port
- Display the CVES in an explore or table format
- Export the CVEs in a CSV format
- View the CVSS and EPSS* scores for the CVE along with the CVE's publish and last modified date
- Select the linked CVE name to open a browser tab to the NIST website with full details for the CVE
* See EPSS at https://www.first.org/epss.
See the new CVE API endpoints here and CVE information in Domains, IPs, and Vulnerabilities.
#
Screenshot Gallery
The screenshot gallery displays images that have been collected for each port. It can be accessed by selecting Exposures > Ports and then selecting the Screenshot Gallery icon.
You can select the "Group by perception" button to see only unique screenshots, with a count of how many ports each is associated with. Select any image to navigate to a table with all its associated ports.
Perceptual groupings are achieved by using a perceptual hash algorithm, which assigns a distinct and comparable hash to each image collected by our website image scanner. You can learn more about this technology here.
#
Favicon Hash
If a port has a favicon (/favicon.ico), the HTTP Metadata scan will fetch an mmh3 hash of it.