Skip to main content

Targets explained

Updated over a week ago

What is an Intruder target?

Broadly speaking, we define targets as one of the following:

  • An external IP address

  • A domain

  • A sub-domain

  • An internal device that supports Windows, Linux, or macOS.
    ​


What option should I choose on the 'add target' modal?

How you choose to add your target will affect what we scan and the license we use.

Option

What can I add here?

What does it cover?

What license does it require?

External infrastructure

  • External IP address

  • Domain

  • Sub-domain

The checks for external infrastructure targets vary depending on your plan. For the details, head over to this article.

Infrastructure license

Internal target

Internal devices running either:

  • Windows

  • macOS

  • Linux

Vulnerabilities present locally on the machine that might not necessarily be found through an external scan. eg, vulnerable software versions, misconfigured security preferences, and incomplete updates.
​
This is important as part of a thorough security posture to ensure that all vulnerabilities are accounted for

Infrastructure license

External web applications

  • External IP address

  • Domain

  • Sub-domain

In addition to the external infrastructure checks as per above, we'll check unauthenticated and authenticated pages for common vulnerability categories, as well as weaknesses in custom software (including zero days), including:

  • OS command injection

  • Enhanced Cross-site scripting (XSS); persistent/stored, reflected and DOM-based XSS

  • Enhanced SQL injection against multiple types of databases

  • NoSQL injection, specifically against MongoDB

  • LDAP injection

  • XPath injection

  • Server-side includes

  • Server-side code injection

  • Java serialisation weaknesses

  • Buffer and integer overflows

Application license

Cloud asset sync

The checks for cloud assets with no authentication added are the same as for 'External Infrastructure' targets (explained above)

Depends on the assets we pull through and what/how you want to scan them.


How does licensing work?

Great question – we have just the article to help answer it.


Can I edit a target once added?

No, unfortunately not. If you wish to change a target (i.e. correct a typo or update the domain), you need to add it as a new target via the targets page.


Where can I find pricing?

The cost of scanning targets for vulnerabilities can be found in two places:

On our website

*These figures are exclusive of VAT.

Use the slider to select the number of targets you wish to scan and hit 'Choose plan':

On the next page, you can select the billing cycle and review the cost. (VAT will be applied where applicable):

Did this answer your question?