Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

30 total results found

2. Common Vulnerabilities

A comprehensive list of Vulnerabilities often found by ReConfirm

Vulnerability knowledgebase

1. ReConfirm Foundation

Development

Security Headers

Security Headers

CVE's

Platform Documentation

Dangerous Open Ports

A comprehensive list for commonly found Dangerous Open Ports by ReConfirm

Open Ports

ReConfirm Common Vulnerabilities

A comprehensive list of Vulnerabilities found by ReConfirm

Getting started with ReConfirm External Attack Surface Management (EASM)

To get started with ReConfirm EASM you can read the following documents to get up to speed: ReConfirm EASM Documentation Understanding Scan Results

Understanding Scanning results

What can we scan using ReConfirm

For comprehensive coverage, we recommend activating ReConfirm on the top-level domain (e.g., demodata.com) instead of individual subdomains (e.g., blog.demodata.com). This approach allows you to monitor all related and underlying assets more effectively.It ope...

Understanding ReConfirm Configuration

API - Webhook

ReConfirm External Attack Surface Documentation

Platform Documentation

Introduction and Overview About the ReConfirm External Attack Surface Management platform ReConfirm does: Comprehensive scanning of domain and network registration databases. Analysis of Internet DNS IP to hostname resolution logs. Passive browsin...

Coming soon

CVE's

Table of Contents: Security headers

Security Headers

1. Access-Control-Allow-Credentials 2. Access-Control-Allow-Headers 3. Access-Control-Allow-Methods 4. Access-Control-Allow-Origin 5. Access-Control-Expose-Headers 6. Access-Control-Max-Age 7. Clear-Site-Data 8. Content-Security-Policy 9. Cross-Ori...

List of Dangerous Open Ports

Dangerous Open Ports

Port: 21 Explanation: This port is used for FTP (File Transfer Protocol). Impact: This port sends its data over plain text, meaning that attackers can abuse this port to intercept and steal credentials. Mitigation: Close port 21 or use SFTP instead. ...

Understanding Vulnerability Scanning results

Understanding Scanning results

It's essential not only to identify vulnerabilities in your attack surface but also to provide you with the most effective information to resolve these issues. Depending on the severity of the vulnerability, you might want to address it directly once a vulnera...

Understanding Email Security Results

Understanding Scanning results

The Email Security section presents the results of security checks on key email authentication protocols, including DMARC, SPF, MX, and DKIM. This information helps users assess the email security configuration of the scanned domain, ensuring that measures are...

Understanding Similar Domains Results

Understanding Scanning results

Similar Domains:The listed domains closely resemble the scanned domain in text or pronunciation. It is crucial to monitor these "lookalike domains," as they pose significant risks to your organization. Lookalike domains are often used by malicious actors to ex...

Understanding Associated Domains Results

Understanding Scanning results

The "Associated Domains" section provides a list of domains that are either connected to the scanned domain or have been seen interacting with it in various capacities. Monitoring these associated domains is crucial as they can give insights into your organiza...

Understanding Assets Scan Results

Understanding Scanning results

The scan results provide a comprehensive list of assets that are directly associated with the initial scanned domain. These assets include subdomains, IP addresses, open ports, and the technologies used on these services. Monitoring these assets is essential f...

Understanding Credential Leaks Results

Understanding Scanning results

The "Credential Leaks" section provides information on email addresses associated with the scanned domain that have appeared in known data breaches. Monitoring credential leaks is crucial for understanding potential security risks and taking action to protect ...

Understanding Subdomains Results

Understanding Scanning results

Subdomain Scan Results The Subdomain Scan provides a comprehensive overview of the subdomains associated with the scanned domain. Monitoring subdomains is crucial as they often host various services and applications that can be potential targets for attackers...

Understanding Inactive Subdomains Results

Understanding Scanning results

The Subdomains - Inactive Results section highlights subdomains that are either currently unresolved or offline. Monitoring these inactive subdomains is crucial for understanding potential risks and managing your organization's attack surface. Even though th...

Understanding SSL/TLS Information Results

Understanding Scanning results

The SSL/TLS Information section provides a detailed overview of the SSL/TLS certificates used by the subdomains of the scanned domain. SSL/TLS certificates are crucial for securing data transmitted between a user's browser and the server, ensuring data integ...

Understanding Scan Configuration

Understanding ReConfirm Configuration

To Do:   Scan configuration General Scan configuration scheduling scans Saving a configuration into a scan profile Recommended scan configuration by ReConfirm Explainer of Jargon. 

Understanding Scan Profiles

Understanding ReConfirm Configuration

Secure Software Development Lifecycle (SSDL) Statement

Platform Documentation

At ReConfirm, we are committed to integrating security into every phase of our Software Development Lifecycle (SDLC). Our Secure Software Development Lifecycle (SSDL) approach is designed to identify, mitigate, and address security risks from the initial sta...

Webhook Implementation Documentation

API - Webhook

Introduction This document provides technical details for integrating your system with our webhook service. The webhook operates over SSL and requires a bearer token for authentication. Once set up, it will send all scan results to your specified endpoint in ...