Recon Insights

circle-info

Note: This page was previously called "Attack Surface Intelligence." The functionality is the same — it has been renamed to better reflect its purpose.

Recon Insights

The Recon Insights page automatically analyzes your reconnaissance scan data to identify potential attack vectors, exposed services, and security risks. Rather than just listing raw scan results, it correlates data from multiple scan modules to surface actionable threats.

Accessing Recon Insights

From the Domainsarrow-up-right page, expand a domain in the sidebar and click Recon Insights. You can also navigate directly via /domains/{id}/attack-surface.

Recon Insights requires a Pro subscription tier or higher.

How It Works

After a scan completes, the Recon Insights engine processes results from three data sources:

1

Fuzzing results

Ryft uses FFUF to brute-force directories and files on your web servers. The engine analyzes every discovered path to identify admin panels, authentication endpoints, sensitive files, and error pages.

2

Archived URLs

Historical URLs collected from the Wayback Machine, Common Crawl, and other public archives are analyzed for patterns. This reveals API endpoints, URL parameters that may be vulnerable to injection, and administrative paths that were once accessible.

3

Passive intelligence

Data from Shodan, Nmap, and HTTPX is correlated to identify exposed services, open ports, and technology fingerprints.

Each discovered item is classified into a threat category, assigned a severity based on its actual risk level, and stored as a finding you can triage and track.

What Gets Detected

Exposed Services

Severity: High

Detects database and administrative services exposed to the internet — Redis, MongoDB, PostgreSQL, MySQL, Elasticsearch, RDP, SSH, and similar. These are high severity because publicly accessible infrastructure services are prime targets for attackers.

Administrative Interfaces

Severity: High (accessible) · Info (protected)

Identifies admin panels, management consoles, and debug endpoints. An admin panel returning HTTP 200 (accessible without authentication) is flagged as high risk. One behind authentication (HTTP 401/403) is flagged as informational.

Authentication Surface

Severity: Info

Discovers login pages, signup forms, password reset endpoints, SSO/OAuth interfaces, and account verification flows. These are expected on every web application and are flagged for awareness only — they do not count against your security score.

Sensitive File Exposure

Severity: Critical · High · Medium (depends on file type)

Detects configuration files, backups, environment files, and other sensitive data accessible via the web:

  • Critical.env, .htpasswd, .sql, .db, .backup, .bak files

  • High.config, .conf, .ini, web.config, .htaccess, Dockerfile files

  • Mediumpackage.json, composer.json, requirements.txt, .log files

Standard public files like robots.txt, security.txt, and sitemap.xml are never flagged.

Information Disclosure

Severity: Medium

Server error responses (HTTP 500, 502, 503, 504) that may leak stack traces, file paths, technology versions, or internal IP addresses.

Parameter Discovery

Severity: High · Medium (depends on parameter type)

Analyzes archived URLs to identify URL parameters that may be vulnerable:

  • High — Injection-prone parameters (id, query, cmd), file access parameters (file, path, include), authentication parameters in URLs (token, password, api_key)

  • Medium — Redirect parameters (url, redirect, next, callback)

Historical Admin Access

Severity: Medium

Administrative endpoints found in archived URL data. These paths were once accessible and may still work with default or weak credentials.

API Surface Discovery

Severity: Low

API endpoints discovered in historical data, worth auditing for authentication and authorization controls.

Technology Fingerprinting

Severity: Info

Technologies and versions identified through HTTP headers, error pages, and default pages. Does not affect your security score.

Threat Summary

At the top of the page, summary cards show the total count of threats by severity level (Critical, High, Medium, Low, Info), giving you a quick overview of the risk landscape for that domain.

Viewing Threat Details

Click any threat row to expand it and see full details including:

  • The specific URL or resource affected

  • Raw evidence from the scan data

  • The data source that detected it (fuzzing, archived URLs, or passive intelligence)

  • Severity justification

AI Triage

You can run AI Triage on any Recon Insights finding. Click the AI Triage button on a finding row to get an automated risk assessment. For HTTP-accessible findings, the AI performs a live probe and analyzes the response. For non-HTTP findings, it analyzes existing scan evidence.

Triage outcomes include Validated, Tentative, and False Positive. See AI Features — AI Triage for full details.

Status Management

Recon Insights findings support the same triage workflow as vulnerability findings:

Status
Meaning
Score Impact

Not Triaged

No action taken yet

Counts against score

Validated

Confirmed as a real risk

Counts against score

Tentative

Needs manual verification

Counts against score

Resolved

Issue has been fixed

Removed from score

False Positive

Not a real risk

Removed from score

To change the status, click the three-dot menu on any finding row, select Change Status, choose the appropriate state, add notes, and click Update State.

How Findings Affect Your Security Score

Recon Insights findings contribute to your organization's overall security score with important distinctions:

  • Informational findings are excluded — Login pages, technology fingerprinting, and other info-level findings have zero impact

  • Lighter weight than vulnerabilities — Weighted at 40% of the impact of an equivalent-severity vulnerability finding

  • Triage states matter — Findings marked as Resolved or False Positive are completely excluded

  • Severity drives impact — Critical and high findings have the most impact; low findings have minimal impact

Notifications

When Recon Insights threats are detected, you'll receive notifications through your configured channels (in-app, email, Slack) with a summary of findings by severity. Critical and high severity findings are highlighted so you can prioritize your response.

Last updated