Articles by Robert Hansen

Personal site: https://www.smartphoneexec.com

False Negatives in Attack Surface Mapping

By Robert Hansen on June 10, 2021

On occasion, there will be an asset that slips through the cracks, and there is a wide variety of reasons for it. Not all assets are made equal, so while an asset may be missed, the ones that are missed are often the least important in terms of risk, but …

Read More

HTML Search

By Robert Hansen on June 7, 2021

One of the most powerful features within Bit Discovery is an often overlooked one – the HTML search. It is so simple, yet so powerful. It gives you the unique ability to “see” what is on each homepage within your environment without having to look at each page.  Think of …

Read More

0days Do not Wait for CVEs

By Robert Hansen on June 3, 2021

What if I were to tell you that an attack surface map can be more effective at finding critical vulnerabilities in some cases than a traditional network vulnerability scan? Crazy to think about, I know.  To understand why it is crucial, you must first understand that CVEs do not matter …

Read More

IT Audit Use Case

By Robert Hansen on May 27, 2021

I had the pleasure of talking to an IT Audit organization that had been using Bit Discovery extensively to protect themselves and audit external IT. When they mean external, they really mean companies they have either acquired or are about to acquire.  We usually don’t get a lot of insight …

Read More

The Right Way to do Attack Surface Mapping

By Robert Hansen on May 17, 2021

This post is the eighth and last of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong ways that people/companies/vendors attempt to do attack surface mapping. In this final post, I will show the right way.

The answer: start with everything

So now …

Read More

Passive DNS is the Wrong Way to do Attack Surface Mapping

By Robert Hansen on May 13, 2021

This post is the seventh of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong ways that people/companies/vendors attempt to do attack surface mapping. Next up is passive DNS and why it is the wrong way.

Passive DNS only is flawed

A handful …

Read More

IP is the Wrong Way to do Attack Surface Mapping

By Robert Hansen on May 5, 2021

This post is the sixth of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong way that people/companies/vendors attempt to do attack surface mapping. Next up is IP and why it is the wrong way.

IP only is flawed

Many security tools scan …

Read More

NetFlow is the Wrong Way to do Attack Surface Mapping

By Robert Hansen on March 26, 2021

This post is the fifth of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong way that people/companies/vendors attempt to do attack surface mapping. Read the first in this series here. Next up is NetFlow and why it is the wrong way.

NetFlow …

Read More

Agents are the Wrong Way to do Attack Surface Mapping

By Robert Hansen on March 24, 2021

This post is the fourth of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong way that people/companies/vendors attempt to do attack surface mapping. Read the first in this series here. Next up are agents and why they are the wrong way.

Agents …

Read More

Crawling Is the Wrong Way to do Attack Surface Mapping

By Robert Hansen on March 23, 2021

This post is the third of a short series of posts that we have dubbed “Attack Surface Mapping the Wrong Way,” showing the wrong way that people/companies/vendors attempt to do attack surface mapping. Read the first in the series here. Next up is crawling and why it is the wrong …

Read More