External attack surface
Every public host, port, certificate, subdomain, and exposed service tied to your organization. Cross-referenced against your asset inventory to find what you missed.
External attack-surface mapping, exposed credential discovery, leaked source-code review, dark-web mention monitoring, executive and brand exposure. We collect what a real adversary would collect, then tell you what to do about it.
What we map in a recon engagement.
Every public host, port, certificate, subdomain, and exposed service tied to your organization. Cross-referenced against your asset inventory to find what you missed.
Combolists, breach corpora, paste sites, malware logs. Credentials by email, by domain, and by reuse pattern. Severity by whether the password is still active.
Public GitHub, GitLab, Bitbucket. Search for code that looks like yours, secrets that match your patterns, internal IP addresses, API keys.
Forums, IRC, Telegram, leak sites, marketplaces. Mentions of your brand, your employees, your customers, your supply chain. Sentiment and seriousness graded.
Public OSINT footprint on named executives. What pretext is available, what targeting is possible, what doxxing risk exists.
Your vendors' breaches that touch your data. Single sign-on providers, payment processors, cloud platforms, JS dependencies served from third parties.
How a recon engagement runs.
Deliverables.
Every host, port, cert, and service tied to your organization. Reconciled against your CMDB to find shadow IT.
Compromised credentials per user, per system, per third party. Ranked by activity and access blast radius.
Verified leaks of code, keys, internal documents, and config snippets. With links to where they live and recommended takedown paths.
Every reference to your brand, employees, or data. Filtered for relevance. Severity graded.
Per-executive OSINT footprint. What is publicly known, what should be scrubbed, what makes them a target.
Per-finding remediation. Who to contact, what evidence to attach, what controls would have prevented the leak.
When recon work is the right move.
Your CMDB does not match reality. Recon is the fastest way to find the shadow IT before someone exploits it.
A user got phished, or a third party breached. You need to know how far the reuse risk reaches.
Adversaries watch for these announcements. Get ahead of the targeting that follows.
You have public-figure executives. Their OSINT footprint translates directly into pretext available to attackers.
Recon FAQ.
No. We work from publicly available breach corpora and verified data. We do not pay for credentials that are still being actively sold.
Only passive collection by default. Active scanning is opt-in and bundled with a penetration test for legal cleanliness.
Collection runs within the engagement window. On retainer, monthly refresh is standard, with alerts between collections.
We can find what is there. We do not invent threats to justify the report. Many engagements come back with very little dark-web exposure, and we say so.
We document the path. Most takedowns require your legal team to send the notice; we draft the template.
A 30-minute call scopes the recon engagement. We will tell you which data streams are most useful for your industry and threat model.