What is an Intruder target?
Broadly speaking, we define targets as one of the following:
An external IP address
A domain
A sub-domain
An internal device that supports Windows, Linux, or macOS.
β
What option should I choose on the 'add target
' modal?
How you choose to add your target will affect what we scan and the license we use.
Option | What can I add here? | What does it cover? | What license does it require? |
External infrastructure |
| The checks for external infrastructure targets vary depending on your plan. For the details, head over to this article. | Infrastructure license |
Internal target | Internal devices running either:
| Vulnerabilities present locally on the machine that might not necessarily be found through an external scan. eg, vulnerable software versions, misconfigured security preferences, and incomplete updates. | Infrastructure license |
External web applications |
| In addition to the external infrastructure checks as per above, we'll check unauthenticated and authenticated pages for common vulnerability categories, as well as weaknesses in custom software (including zero days), including:
| Application license |
Cloud asset sync |
| The checks for cloud assets with no authentication added are the same as for 'External Infrastructure' targets (explained above) | Depends on the assets we pull through and what/how you want to scan them.
|
How does licensing work?
Great question β we have just the article to help answer it.
Can I edit a target once added?
No, unfortunately not. If you wish to change a target (i.e. correct a typo or update the domain), you need to add it as a new target via the targets page.
Where can I find pricing?
The cost of scanning targets for vulnerabilities can be found in two places:
On our website
Use the slider to select the number of targets you wish to scan and hit 'Choose plan
':
On the next page, you can select the billing cycle and review the cost. (VAT will be applied where applicable):