Data extraction tools on the platform

Alphin

Last Update för 4 månader sedan

Data Extraction Tools page offers a comprehensive library of scan profiles to address your security testing needs, alongside the option to upload manually generated scan reports for further analysis and integration.

The threat hunting profiles are also called eCylabs bots. The applications which are onboarded on the security center discover the virtual assets that are associated with the web application. You can enable a threat hunting profile for every asset based on the application characteristics to gain insight on the security issues for the particular application or asset. eCylabs provides various types of threat hunting profiles.

On this page you can see following information:

  • URL Inspection.
  • Certificate Check.
  • Penetration Testing.


1. URL Inspection


URL inspection profiles discuss all the URLs that are behind the application and find out any malicious code or malware that are injected into the code and it helps to identify that malicious code.


To view the profile:

1. Login to eCyLabs Security Center.

2. Click on applications in the side menu.

3. Click on the report button for the respective application.

4. You can view the URL inspection under the threat profile tab.

5. Click on the malware-infected URLs under the URL inspection tab to view infected URLs.

6. Click on the blacklisted URL under the URL inspection tab to view who blacklisted your URL.

7. Click on integrity check to view added or modified URLs.

2. Certificate Check


Certificate check profile discovers all the issues that are associated with the HTTPS, SSL certificates, or SSH.


To view certificate check:

1. Login to eCyLabs Security Center.

2. Click on the applications from the side menu.

3. Click on the report button for the respective application.

4. You can view the certificate check under the threat profile tab.

5. Click on SSL/TLS certificate issues to view certificate-related issues.

6. Click on SSH connection related issues to view SSH related issues.

3. Penetration testing


Penetration testing has various types of random checks inside that category it performs SQL injection, cross-site scripting attack, security broken authentication like all OWASP top 10 categories covered in the penetration testing.


To view penetration testing:

3.1 Login to eCyLabs Security Center.

3.2 Click on the applications from the side menu.

3.3 Click on the report button for the respective application.

3.4 Click on the penetration testing under the threat profile tab.

Was this article helpful?

1 out of 1 liked this article

Still need help? Message Us