Copy
View this email in your browser
<<First Name>>, 

What if you could automatically...
  • Get an overview of your network perimeter exposure?
  • Find open ports that shouldn't be publicly accessible?
  • Detect old web technologies from a centralized view?
With the new Attack Surface feature in your Pentest-Tools.com dashboard, you can! 

No setup, extra effort, or extra cost involved.

Tell me more 


Now you can quickly visualize your network exposure and reduce your attack surface based on reliable, up to date data.

The Attack Surface automatically pulls data from the following scanners: Website Recon, Website Scanner, TCP Port Scanner, UDP Port Scanner,  OpenVAS Scanner, and aggregates scan results in a unified, centralized view. (Yes, we’ll add support for more tools in the future!)

Explore the feature

4 ways to use the new feature 

Each workspace you create in your Pentest-Tools.com account generates an Attack Surface specific to the targets in it. Find scan results grouped by asset categories - in a table format you can easily export as CSV or JSON.

Use the Attack Surface to:

   ✔ Easily detect web technologies and spot outdated, unpatched network services
   ✔ Determine which open hosts, ports, services, and technologies increase your exposure
   ✔ Find which technologies your systems are running (e.g. WordPress, ASP NET, etc.) - fast!
   ✔ Assess how much work a pentest might involve
Log in to try it

Got feedback for us? Shoot us an email at support@pentest-tools.com! We’d love to hear from you and work your ideas into our future platform updates. 

Have an awesome rest of your week, 
The Pentest-Tools.com Team

Let's stay in touch!
Twitter
LinkedIn
Copyright © 2020 PentestTools SRL, All rights reserved.
You are receiving this email because you opted in at our website or used Pentest-Tools.com in the past.

Our mailing address is:
PentestTools SRL
Caderea Bastiliei 64, 1st Floor
Bucharest, Romania EU

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.