DiscoverSurfacing SecurityInternet-Wide Recon: Moving Past IP-Centric Approaches
Internet-Wide Recon: Moving Past IP-Centric Approaches

Internet-Wide Recon: Moving Past IP-Centric Approaches

Update: 2024-10-02
Share

Description

In this episode, we discuss the blindspots of IP-centric approaches to asset discovery and the importance of understanding the full attack surface of an organization.

We unpack the challenges posed by modern cloud architectures, load balancers, and WAFs, and how these can create blind spots in reconnaissance efforts. We also highlight the significance of subdomain data and passive DNS in uncovering hidden attack surfaces that traditional scanning methods might miss.

We talk about:
- The limitations of Internet Wide Scanning
- The importance of breadth and depth in attack surface mapping
- Real-world examples of blind spots in modern infrastructure
- The role of DNS and path-based routing in security assessments
- Insights into IPv6 and its implications for discovery

For more details about Assetnote's Attack Surface Management Platform, visit https://assetnote.io/

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Internet-Wide Recon: Moving Past IP-Centric Approaches

Internet-Wide Recon: Moving Past IP-Centric Approaches

Assetnote