# Attack Surface Monitoring

Attack Surface Monitoring (ASM) provides visibility in your exposure to external threats from the internet. Most ASM solutions focus on purely infrastructure related exposures but most often breaches happen due to identity related attacks. "Attackers don't 'hack' in, they log in". That's why the Aikido platform includes both infrastructure and identity related threats to cover the whole attack surface.&#x20;

## Use Cases

* 🔍 **Attack Surface Monitoring**: Detect forgotten subdomains, exposed databases, outdated software, and more before attackers do.
* 🕵️ **Shadow IT Discovery**: Uncover unauthorised or forgotten assets that may not be under proper security management
* :tophat: **Darknet monitoring:** Identify already compromised credentials on the darknet.&#x20;
* :office: **Boost Third Party Risk Management (TPRM) ratings:** Address key factors TPRM platforms use to assess your security posture and boost your chances of closing new deals.
* ✅ **Compliance Verification**: Validate that your external-facing systems meet industry standards and regulatory requirements.&#x20;

## Infrastructure Attack Surface Monitoring

infrastructure monitoring provides visibility into your external security posture by continuously monitoring your internet-facing assets for vulnerabilities and exposures.&#x20;

This proactive approach helps you identify and remediate security risks before they can be exploited.

### **Asset Inventory Management**

* Performs subdomain enumeration to map systems that are publicly accessible
* Resolves IP addresses and verifies reachability from the internet

{% hint style="info" %}
If AWS is connected in Aikido CSPM, the subdomains for a configured root domain are automatically enriched with Route 53 records and continuously monitored. \
\
**Note:** Root domains like insecure.org are not automatically added to the Attack Surface module to avoid unwanted traffic to your domains. The subdomains like web.insecure.org are imported.&#x20;
{% endhint %}

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2F6z6AgP48D5nHEee8Ut3j%2Fimage.png?alt=media&#x26;token=f4ad3f42-b1c0-4199-beaa-02744be8265e" alt=""><figcaption></figcaption></figure>

### **Vulnerability Scanning**&#x20;

* Leverages a vast library of security checks to identify known vulnerabilities
* Detects misconfigurations in web servers, applications, and infrastructure
* Identifies outdated software versions with known security issues

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FiFJw9GgJlOA6ZUt7O7oM%2FScreenshot%202025-07-28%20at%2016.08.01.png?alt=media&#x26;token=85ac54a5-629a-4d47-b5d0-c3fb54e86bce" alt=""><figcaption></figcaption></figure>

### **Subdomain Takeover Identification**

Detects misconfigurations in DNS records that could lead to subdomain takeovers

* Identifies vulnerable subdomains pointing to deprovisioned or unclaimed services
* Continuously monitors for dangling DNS records (Domain Dangling) that could be exploited by attackers

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2ForztqTamB37JZ05hvdLs%2Fimage.png?alt=media&#x26;token=2e77f993-2563-4588-b3ab-d9c0e4676a5b" alt=""><figcaption></figcaption></figure>

### Email Spoofing Protection

Identifies missing or misconfigured mail security records like SPF, DKIM and DMARC to validate email security settings and prevent spoofing of your domains in phishing attacks.&#x20;

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FvNXG8qYvyzrFwfLftYY2%2FScreenshot%202025-07-28%20at%2016.08.39.png?alt=media&#x26;token=f2a3704c-4ff3-407a-bec1-e13d4f4d3924" alt=""><figcaption></figcaption></figure>

### **DNS Zone Transfer Attacks**&#x20;

Identifies misconfigurations in the DNS nameservers that would allow for zone transfer attacks.&#x20;

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FjgKpXm2uH44c9ep4Y7E6%2Fimage.png?alt=media&#x26;token=be5f2c1e-b8e0-41af-95d1-93efcba734f5" alt=""><figcaption></figcaption></figure>

### **Port Exposure Detection**

Identifies open ports that are exposed to the internet and highlights management, file sharing ports or database ports.

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FpEP3quRAiEd8MI8kxpQv%2Fimage.png?alt=media&#x26;token=f03572e6-1763-4252-b4f9-59c2aaa3cbde" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2F9FWVteGmIlV2KVsOQsU7%2Fimage.png?alt=media&#x26;token=696243b6-c15a-467d-bcd9-70313e82b66e" alt=""><figcaption></figcaption></figure>

### TLS Security Hardening&#x20;

Identifies insecure or weak TLS configurations&#x20;

* Detects weak or insecure TLS protocols in use like SSL 3.0, TLS 1.0 and TLS 1.1
* Discovers weak or insecure cipher suites that are configured to establish the encrypted connection
* Assesses the Post-Quantum readiness of your TLS configuration
* Highlights issues in certificates that could provide problems in verifying and establishing a chain of trust&#x20;
* Monitors the health of the certificates used by your servers and alerts these are about to expire

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2F3EMVa8zJcIkdLQjAR0rL%2Fimage.png?alt=media&#x26;token=1f5fe98a-8b79-4ca1-a947-dc5e6cd1b6c9" alt=""><figcaption></figcaption></figure>

### Supabase Potential Data Breach Validation

Identifies Supabase instances for which a misconfigured Row Level Security (RLS) policy results in a potential data breach. It works in the following steps:&#x20;

1. **Key discovery**: Crawl deployed frontend JavaScript assets to extract the Supabase client anon key.
2. **Project identification**: Determine the Supabase project endpoint (e.g., https\://\<project>.[supabase.co](http://supabase.co/)) from the JWT token or code references.
3. **Credential validation**: Establish a connection to the project to verify that the extracted anon key is valid.
4. **Surface enumeration**: Enumerate tables within the public schema that are addressable through the client context.
5. **Permission testing**: Attempt read and write operations on each table using only the anon key to identify gaps caused by missing or misconfigured RLS.
6. **Sensitivity assessment**: For any table that is readable, analyze returned records for PII and other sensitive fields to determine exposure severity and remediation priority.

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FmLsZInC3LOlOBrJHriT9%2Fimage.png?alt=media&#x26;token=5e409b75-2e14-43ed-844a-76bff9f53b30" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2F0lrZJbHd6eT6SxHekbnf%2Fimage.png?alt=media&#x26;token=70ff256f-66ee-4fef-acc2-8e87085bc13e" alt=""><figcaption></figcaption></figure>

## Identity Exposure Monitoring

To defend against identity-related attacks, the platform detects exposed credentials on the dark web and safely tests for default, weak, and leaked passwords across your organisation’s login portals.

### **Darknet Monitoring**

* Discovers leaked usernames and passwords on the darknet
* Monitors code repositories, paste sites, and data breach collections
* Helps prevent account takeovers and unauthorized access

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FQvESrmDABnS69HuzylPY%2FScreenshot%202025-07-28%20at%2016.12.48.png?alt=media&#x26;token=9477f377-a6c3-46d2-b04c-102b59932863" alt=""><figcaption></figcaption></figure>

### Weak and Default Credentials Usage Detection (COMING SOON!)

Identifies the exposure of weak and default credentials on login portals related to your organisation.

### Leaked Credential Validation (COMING SOON!)

Validates the leaked credentials identified in previous steps to verify whether these still work on exposed login portals and whether these have been reused accross applications.&#x20;

## How to Set-up

**Step 1:** Click **Add Domain** in the [Domain Overview ](https://app.aikido.dev/domains)and **select Attack Surface**

![Application type selection screen for security testing of different app architectures.](https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2F3de7y6HbkO7mAS8LS8aM%2FScreenshot%202025-07-28%20at%2011.28.03.png?alt=media\&token=f009a094-6f58-403f-89fb-65c56151c43a)

**Step 2.** Enter the domain name of your **environment**. Ensure this is a root domain (e.g., `example.com`). In case you only want to scan a subset of domains that are f.e. connected to a specific departement or geography, you can also use `us.example.com` to only scan subdomains from `*.us.example.com`.&#x20;

![Attack surface domain name input field](https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2Fi6w0h7ULeB9ZCiSpOHGg%2FScreenshot%202025-07-28%20at%2011.22.45.png?alt=media\&token=dc07d357-91f0-4291-8a9e-fb9375582b48)

**Step 3.** To prevent abuse, we require you to prove that you are the owner of the domain you'd like to scan. Configure the CNAME or TXT record in your DNS registrar and once done, click "Verify Domain".&#x20;

<figure><img src="https://3149773201-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FyKbzcQGrx7UtrG0nPZZ7%2Fuploads%2FEVegDc6E5McuTgEge2Ng%2Fimage.png?alt=media&#x26;token=a195ec1f-0232-4580-b3b4-126bfc6f018d" alt="" width="563"><figcaption></figcaption></figure>

{% hint style="info" %}
Domains are automatically marked as verified when the Attack Surface scan is configured by a user whose email address matches the target domain in scope.
{% endhint %}

**Step 4.** A scan will automatically start after completing the set-up.&#x20;

## Identifying Traffic

All requests coming from Aikido Attack surface scans will have:

* the `User-Agent` set to `aikido-surface-agent/1.0`&#x20;
* the following header `aikido-surface-test` set to value `1` in the request &#x20;
* [will come from the IP's documented here](https://help.aikido.dev/~/revisions/SGhJfnCIOpxRjx1gC1k5/dast-surface-monitoring/allowing-ip-addresses-for-dast-surface-monitoring)
