All pages
Powered by GitBook
1 of 4

6. Asset Management

๐Ÿ“– Overview

The Asset Management section is where you can track, analyze, and evaluate the external surface of your digital infrastructure. ShieldsGuard actively scans your domains, subdomains, technologies, and open ports โ€” building a complete picture of your environment and its exposure.

This section consists of three functional modules:

  • 6.1 Asset Management โ€“ Centralized view of domains, ports, and technologies

  • 6.2 Network Topology โ€“ Visual mapping of interconnected nodes and services

  • 6.3 Vulnerability Scan โ€“ Detection and classification of security weaknesses

๐Ÿ”Ž This section allows you to monitor what you own โ€” and ensure nothing is exposed without your awareness.

6.1 Asset Management6.2 Network Topology6.3 Vulnerability Scan

6.1 Asset Management

๐Ÿ“– Overview

The Asset Management module is the heart of your external surface visibility. It provides a centralized dashboard that continuously tracks, catalogs, and monitors the digital assets you own โ€” including domains, subdomains, associated technologies, ports, IPs, and metadata.

Whether you're managing a single website or a complex infrastructure with dozens of services, this module gives you the visibility needed to secure your perimeter.


๐Ÿ“Š What You Can See

Summary Cards:

  • Total Asset (Domain) โ€“ Number of discovered domains/subdomains.

  • Technologies โ€“ Total count of unique technologies detected across assets.

  • Critical Vulnerabilities โ€“ How many unresolved, high-risk findings exist.

Statistics Panels:

  • Asset Statistics โ€“ Radar chart showing distribution of technologies, ports, and asset counts.

  • Vulnerability Statistics โ€“ Visual classification of detected issues by severity (Critical, High, Medium, Low, Info).


๐Ÿ” Domain Detail Breakdown

Each domain entry provides a comprehensive technical and security profile. You can expand it to view:

1. ๐ŸŒ General Information

  • IP address & Port

  • Protocol used (HTTP/HTTPS)

  • ASN & ISP ownership

  • Abuse score

  • Country and geolocation

2. ๐Ÿงฉ Technologies

  • CMS platforms (e.g., WordPress, Plesk)

  • Libraries and frameworks (Bootstrap, Elementor, Google Fonts)

  • Server stack (PHP, MySQL, NGINX)

3. ๐Ÿงพ HTTP Headers

  • Full response headers (security headers, cache controls, cookies)

4. ๐Ÿ” SSL Information

  • Certificate issuer, subject, expiration dates, cipher strength

  • SSL health based on scan engine (e.g., TLS 1.2, weak ciphers)

5. ๐Ÿ“ก DNS Panel

  • A/AAAA/MX/CNAME/NS/TXT records

  • SPF, DKIM, DMARC validation

  • DNSSEC validation state and change logs

6. ๐Ÿ†” WHOIS Information

  • Domain registrar

  • Expiration & creation dates

  • Raw WHOIS output

โœ… This level of insight allows you to monitor your assets not just by IP or hostname, but by actual risk, technology, exposure, and ownership.


๐Ÿ” Search & Filter

You can search and filter assets by:

  • Domain name

  • Technology used (e.g., PHP, WordPress, React)

  • Open port (e.g., 80, 443)

This helps isolate vulnerable or misconfigured environments, or group assets by technology stack.


๐Ÿ” Why It Matters

Without visibility, you can't protect what you don't know you have.

The Asset Management module helps:

  • Detect shadow IT (unknown domains or services)

  • Prevent tech stack sprawl and unmanaged exposure

  • Monitor changes in infrastructure over time

  • Serve as a foundation for vulnerability assessment


๐Ÿง  Use Cases

Use Case
Result

Discover forgotten subdomains

Avoid exposure of legacy services

Track CMS & plugin usage

Identify outdated or risky versions

Watch SSL expiration dates

Avoid certificate downtime or MITM exposure

Validate security headers

Spot missing XSS/CORS/HSTS protections

Map IP and provider attribution

Detect hosting/ISP changes or anomalies


โš™๏ธ Best Practices

  • Run asset discovery scans on a regular schedule (e.g., weekly).

  • Review port usage to detect unexpected exposures (e.g., non-standard ports).

  • Monitor for newly added technologies that increase your attack surface.

  • Combine with Vulnerability Scan (6.3) for actionable insights.


๐ŸŽฏ ShieldsGuardโ€™s Asset Management doesnโ€™t just give you a list โ€” it builds a living, evolving picture of your digital perimeter. Know your assets. Reduce your risk. Secure with confidence.

6.2 Network Topology

๐Ÿ“– Overview

The Network Topology module offers a visual and interactive map of your entire internet-facing infrastructure. It illustrates the relationships between your domains, IP addresses, technologies, ports, and vulnerabilities in real-time โ€” enabling you to understand your attack surface as a connected structure, not just a list.

๐Ÿง  Think of this as a cybersecurity radar that shows how all your digital assets are linked, and where your weaknesses may lie.


๐Ÿงฉ What It Displays

๐Ÿงฑ Nodes:

Each node represents an entity in your infrastructure:

  • Domain or subdomain (e.g., app.yourcompany.com)

  • IP Address

  • Open port or protocol (e.g., 443/HTTPS, 21/FTP)

  • Technology in use (e.g., PHP, MySQL, WordPress)

  • Associated vulnerability (if found)

๐Ÿ”— Connections:

Lines between nodes show direct associations such as:

  • Domains resolving to IPs

  • IPs running services on specific ports

  • Ports linked to technologies or risk factors

๐ŸŽจ Node Indicators:

Each node is color-coded based on its type or threat level:

  • ๐Ÿ”ต Domain

  • ๐ŸŸ  IP Address

  • ๐Ÿ”ด Critical Vulnerability

  • ๐ŸŸก High Risk

  • ๐ŸŸข Safe

  • โšซ Unknown/Other


๐Ÿ–ฅ๏ธ Interactive Features

  • Zoom & Pan โ€” Explore the map freely or fit to screen

  • Filter Nodes โ€” Search by domain, IP, or vulnerability

  • Layout Options โ€” Switch between graph models (e.g., CoSE, Circle, Grid)

  • Export โ€” Download your topology as a PNG for reports or auditing

  • Node Detail Panel โ€” Click any node to view:

    • Associated ports

    • Technologies

    • Resolved IP

    • Detected vulnerabilities


๐Ÿ› ๏ธ Why It Matters

Traditional asset lists canโ€™t show how things are connected โ€” and attackers exploit relationships.

This view helps you:

  • Detect exposed nodes with shared risk

  • Identify forgotten or shadow systems still reachable

  • Spot single points of failure or shared infrastructure risk

  • Understand potential pivot paths in case of breach


๐Ÿ” Example Scenarios

Use Case
What You Can Discover

A vulnerable service on shared IP

Multiple domains exposed through one IP

A forgotten subdomain still active

Visualized next to your main infrastructure

A non-SSL port open to internet

See it linked under an insecure protocol node

A legacy PHP app next to new stack

Legacy risk adjacent to modern services


โš™๏ธ Best Practices

Action
Why It Matters

Review the topology weekly

Spot new or unauthorized connections

Export before change deployments

Compare before/after network footprint

Investigate isolated nodes

May indicate misconfigurations or forgotten assets

Monitor for red nodes

Indicates confirmed vulnerabilities


๐ŸŽฏ The Network Topology module turns your digital surface into a visual map of risk. Not only will you see whatโ€™s online โ€” youโ€™ll see whatโ€™s connected, and what needs to be secured.

6.3 Vulnerability Scan

๐Ÿ“– Overview

The Vulnerability Scan module provides real-time detection, classification, and visibility into the known and potential security weaknesses across your entire digital surface.

This system continuously analyzes exposed services, technologies, protocols, and configurations to identify vulnerabilities โ€” then ranks them by severity so you know exactly what to fix, and where.

๐Ÿšจ ShieldsGuard helps you stay ahead of attackers by showing what they see before they exploit it.


๐Ÿ” What It Scans

  • Web application stack (WordPress, PHP, Plesk, etc.)

  • SSL/TLS configuration and certificate health

  • HTTP headers and content security policies

  • Open ports and exposed services

  • Publicly accessible endpoints

  • CMS plugin versions

  • Protocol vulnerabilities and misconfigurations

  • Missing or misconfigured DNS and email security


๐ŸŽฏ Severity Levels

All findings are categorized using a clear, color-coded system:

Severity
Meaning

๐Ÿ”ด Critical

Exploitable vulnerabilities with high impact

๐ŸŸ  High

Major misconfigurations or outdated technologies

๐ŸŸก Medium

Weaknesses requiring mitigation

๐Ÿ”ต Low

Minor risks or hygiene issues

โšช Info

Informational or best practice observations

Each severity level helps prioritize remediation based on real-world impact.


๐Ÿ“‹ Vulnerability Detail

Every finding includes:

  • Affected domain and URL

  • Risk level (color and label)

  • Vulnerability type or CVE (if applicable)

  • Description of the issue

  • Discovery method

  • Exact URL or port

  • Suggested resolution

  • Timestamp

  • Quick access to โ€œViewโ€ for more details


๐Ÿง  Example Findings

Vulnerability
Risk Level
Affected Component

CVE-2020-24778 (GSAP)

High

JavaScript library

Missing HSTS Header

Medium

HTTP response headers

Misconfigured CORS

Medium

API endpoints

SSL Certificate Near Expiry

Medium

TLS

Missing HttpOnly on Cookies

Low

Set-Cookie directive

No DKIM or SPF Records

Info

Email configuration

WordPress XML-RPC Brute Force Exposure

Medium

WP login subsystem

REST API Enumeration

Info

WP-JSON endpoint


๐Ÿ“ˆ Dashboard Features

  • ๐Ÿ“Š Risk Score Gauge โ€” Visual snapshot of risk posture

  • ๐Ÿ“‘ Security Findings Table โ€” Fully filterable by severity or domain

  • ๐Ÿงฎ Vulnerability Histogram โ€” Severity-wise chart

  • ๐Ÿ” Domain Filter โ€” Narrow scope by subdomain or asset

  • ๐Ÿ“ค Export Capabilities โ€” Download reports for audits or incident response


โš™๏ธ How to Use It Effectively

Goal
Action

Patch critical exposures quickly

Sort by severity and act on ๐Ÿ”ด/๐ŸŸ  first

Track remediation over time

Re-scan after fixes and compare findings

Improve compliance posture

Export finding logs with timestamps

Investigate patterns

Correlate vulnerabilities across domains

Confirm system health after deploy

Run scan post-update to detect regressions


๐Ÿ” Best Practices

  • Integrate scans into your change and release cycle.

  • Treat HIGH and CRITICAL findings as blockers in CI/CD.

  • Review LOW/INFO items regularly for hygiene improvements.

  • Use scan results to update your WAF, IP filters, and rules.


๐ŸŽฏ ShieldsGuard Vulnerability Scan is your early warning system โ€” detecting what could be exploited before attackers do, and giving you a prioritized, actionable plan to fix it.