Secure Your Digital Footprint
Visualize your attack surface, discover vulnerabilities, and monitor your assets continuously.

risk_analysis.dashboard
Attack Surface Risk Analysis
Last scan: 2023-05-17 14:30 UTC
Risk Level:High
Trend:
+12%
85
RISK SCORE
Critical Vulns6
High Vulns12
Med/Low Vulns19
Asset
Vulnerability
Severity
Remediation
api.example.com:443
CVE-2023-1234 (Apache 2.4.41)
Critical (9.8)
Update Apache to 2.4.57+
dev.example.com:3306
MySQL Auth Bypass (5.7.33)
Critical (9.1)
Update MySQL to 8.0.32+
s3.example.com
Public S3 bucket (ACME-DATA-01)
High (7.5)
Restrict bucket access
dev.example.com:22
Exposed SSH (Internet)
High (7.2)
Use VPN + IP restriction
stage.example.com
TLS 1.0 Enabled
Medium (5.3)
Disable TLS 1.0/1.1, use 1.2+
tresal_scanner.sh
$ ./tresal_scanner --target example.com --deep-scan
[+] Starting attack surface scan for example.com (203.0.113.42)
[*] Discovering subdomains and infrastructure...
api.example.com (203.0.113.10) - Web API Gateway
dev.example.com (203.0.113.11) - Development Environment
stage.example.com (203.0.113.12) - Staging Server
test.example.com (203.0.113.13) - QA Test Environment
s3.example.com (203.0.113.14) - AWS S3 Bucket Frontend
[*] Scanning for open ports and services...
[!] dev.example.com - TCP/22 (SSH OpenSSH 7.9) - Exposed to Internet
[!] dev.example.com - TCP/80 (HTTP Apache 2.4.41) - Exposed to Internet
[!] dev.example.com - TCP/3306 (MySQL 5.7.33) - Exposed to Internet
[*] Analyzing service configurations...
[!] s3.example.com - Public bucket with anonymous read access
[*] Scanning for vulnerabilities...
[!] CRITICAL: CVE-2023-1234 on api.example.com (Apache 2.4.41) - RCE vulnerability
[!] HIGH: CVE-2023-5678 on dev.example.com (MySQL 5.7.33) - Auth bypass
[+] Scan complete. Generated report with 17 findings (3 critical, 5 high, 9 medium)