Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Attack Surface Management

The continuous process of discovering, inventorying, and reducing an organization's externally exposed digital assets to minimize exploitable entry points.

Definition

Attack Surface Management (ASM) is the ongoing practice of identifying, classifying, and monitoring all internet-facing assets an organization owns or operates — including domains, subdomains, IP ranges, open ports, certificates, and third-party exposures. Unlike point-in-time assessments, ASM treats the attack surface as a living map that changes as infrastructure evolves. The goal is to eliminate unknown or unmanaged assets before adversaries discover and exploit them.

Why It Matters

Organizations routinely underestimate their external footprint: forgotten subdomains, shadow IT, misconfigured cloud storage, and expired certificates are consistent footholds for initial access. Threat actors actively scan the internet using the same tools defenders use, meaning any exposed asset is a potential target within hours of appearing online. Continuous ASM closes the visibility gap between what security teams think is exposed and what attackers actually see.

How It Works

ASM begins with passive and active discovery — enumerating subdomains via DNS brute-force, certificate transparency logs, and OSINT sources, then probing discovered hosts for open ports and running services. Each asset is fingerprinted to identify software versions, SSL/TLS configuration, and known CVEs. Risk scoring aggregates findings across multiple signal sources to prioritize remediation by exploitability and business impact. Modern ASM platforms continuously re-scan and alert on newly emerged or changed assets.

DFIR Platform

Exposure Scanner

The DFIR Platform's Exposure Scanner aggregates data from 11 intelligence providers — Shodan, Criminal IP, Netlas, SSL Labs, crt.sh (certificate transparency), BGPView, WhoisXML, SecurityTrails, OTX, HackerTarget, and IP-API — into a single risk-scored report (0-100). Run it free at dfir-lab.ch/exposure-scanner or via CLI with `dfir-cli exposure scan <domain>`.

View Documentation

Related Concepts

IOC EnrichmentPhishing AnalysisMITRE ATT&CK Framework

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free