#
Products
Third-party products comprise one of the most common attack vectors for threat actors. Well known and with documented exploits, most third-party tools, if not well patched, offer an easy mechanism to enter your internal network. We identify over 1500 common technologies and manually escalate any discovered with publicly known vulnerabilities. Product discovery is performed by analyzing all exposed Ports, sending requests to them, and analyzing the responses for common patterns and fingerprints these technologies are known to respond with.