Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Attack Surface Management

The continuous process of discovering, inventorying, and reducing an organization's externally exposed digital assets to minimize exploitable entry points.

Definition

Attack Surface Management (ASM) is the ongoing practice of identifying, classifying, and monitoring all internet-facing assets an organization owns or operates — including domains, subdomains, IP ranges, open ports, certificates, and third-party exposures. Unlike point-in-time assessments, ASM treats the attack surface as a living map that changes as infrastructure evolves. The goal is to eliminate unknown or unmanaged assets before adversaries discover and exploit them.

Why It Matters

Organizations routinely underestimate their external footprint: forgotten subdomains, shadow IT, misconfigured cloud storage, and expired certificates are consistent footholds for initial access. Threat actors actively scan the internet using the same tools defenders use, meaning any exposed asset is a potential target within hours of appearing online. Continuous ASM closes the visibility gap between what security teams think is exposed and what attackers actually see.

How It Works

ASM begins with passive and active discovery — enumerating subdomains via DNS brute-force, certificate transparency logs, and OSINT sources, then probing discovered hosts for open ports and running services. Each asset is fingerprinted to identify software versions, SSL/TLS configuration, and known CVEs. Risk scoring aggregates findings across multiple signal sources to prioritize remediation by exploitability and business impact. Modern ASM platforms continuously re-scan and alert on newly emerged or changed assets.

DFIR Platform

Exposure Scanner

The DFIR Platform's Exposure Scanner aggregates data from 11 intelligence providers — Shodan, Criminal IP, Netlas, SSL Labs, crt.sh (certificate transparency), BGPView, WhoisXML, SecurityTrails, OTX, HackerTarget, and IP-API — into a single risk-scored report (0-100). Run it free at dfir-lab.ch/exposure-scanner or via CLI with `dfir-cli exposure scan <domain>`.

View Documentation

Related Concepts

IOC EnrichmentPhishing AnalysisMITRE ATT&CK Framework

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free