Workflows / Full Security Assessment

Full Security Assessment

Comprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.

A full security assessment provides end-to-end visibility into your application and infrastructure security posture. Starting with host discovery and service enumeration, the workflow progresses through automated vulnerability scanning and active penetration testing to uncover both known and novel security weaknesses.

Each finding is enriched with CVE intelligence including CVSS scores, exploit availability, and remediation guidance. This workflow is ideal for pre-launch security reviews, periodic security audits, and compliance assessments where thorough coverage is required.

Steps

1

Probe Target Infrastructure

Security HTTPx icon
Security HTTPx

Discover live hosts, open ports, and running services across the target domain to map the attack surface.

Input: Target domain or list of subdomains to probe.
Output: Live hosts with open ports, HTTP status codes, technologies detected, and TLS information.
2

Run Vulnerability Templates

Security Nuclei icon
Security Nuclei

Execute Nuclei vulnerability templates against discovered hosts to identify known security issues.

Input: List of live hosts from the probe step.
Output: Matched vulnerabilities categorized by severity with CVE references and remediation guidance.
3

Deep Penetration Testing

Pentest icon
Pentest

Perform active penetration testing including injection, XSS, and authentication bypass attempts.

Input: Target URL and discovered endpoints from previous steps.
Output: Exploitable vulnerabilities with proof-of-concept details and risk ratings.
4

Enrich with CVE Intelligence

Vulnerability Database icon
Vulnerability Database

Look up detailed CVE information for each discovered vulnerability to assess real-world impact and available patches.

Input: CVE identifiers from the scanning and pentest results.
Output: Full CVE details including CVSS scores, affected products, exploit availability, and patch references.

Benefits

  • Complete attack surface mapping from infrastructure to application layer
  • Automated detection of thousands of known vulnerability patterns
  • Active penetration testing catches issues scanners miss
  • CVE enrichment provides actionable remediation priorities
  • Consolidated report suitable for compliance and stakeholder review

Related Use Cases

Open Test API Security

Test API Security

Assess the security of REST APIs by testing authentication, authorization, input validation, and injection resistance.

Pentest icon
Pentest
4 agent guides
Open Probe Security Headers

Probe Security Headers

Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Discover Hidden Services

Discover Hidden Services

Find hidden or forgotten web services running on your infrastructure that may be exposed without your knowledge.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Check for Known CVE Exposures

Check for Known CVE Exposures

Detect whether your targets are affected by specific CVEs with publicly disclosed exploits.

Security Nuclei icon
Security Nuclei
4 agent guides
Open Research Vulnerabilities by Software

Research Vulnerabilities by Software

Search for known vulnerabilities affecting specific software products, libraries, or frameworks in your stack.

Vulnerability Database icon
Vulnerability Database
4 agent guides
Open Check CVE Details

Check CVE Details

Look up detailed information about specific CVEs including severity, affected versions, exploit availability, and patches.

Vulnerability Database icon
Vulnerability Database
4 agent guides