Security Scanning and Vulnerability Tool
Security Scanning and Vulnerability Tool
AND VULNERABILITY
MANAGEMENT TOOL
INDEX
• Title
• Introduction
• The Need for Security Scanning
And Vulnerability Management Tool
• Core Features
• The Scan Engine
• Databases and Collections
• Scan in Action
• Results and Alerts
SECURITY SCANNING AND VULNERABILITY MANAGEMENT
TOOL : A HOLISTIC SECURITY TOOLSET
• "Enhancing Security for Product Teams, Red Teams, and Bug Bounty Hunters"
INTRODUCTION
• It is an integration of open source security tools aimed to provide a holistic security view for a given domain/IP. The way
Watchdog is built, it can be used by product security teams, red teams and also by bug bounty hunters to get a 360° view
of any Internet property it scans. Given a list of domains/IP's it has the capability to perform a network scan, feed the
output to open source web app scanners like Google's skip-fish and wapiti, perform tech stack analysis and determine if
the stack has any known CVE’s.
THE NEED FOR SECURITY SCANNING AND
VULNERABILITY MANAGEMENT TOOL
• It is designed considering the use case necessary to know all open services and its
corresponding technologies for the endpoints you own, exposed over the Internet. As a
company grows, it’s foot-prints grow on the World Wide Web leaving it's product security team
with herculean task of maintaining an inventory of all the services and technologies exposed.
This becomes further crucial at the event of a zero-day outbreak for a particular protocol or a
third party product which might affect public endpoints of the company
• It has the ability to scan all endpoints and perform technology version analysis on the services it
detects and map this information with it’s rich CVE database maintained and updated locally.
CORE FEATURES