Analysing scan results

Understanding Statistics

Each module has a Statistics view with severity and vulnerability breakdowns.

  1. Go to Modules[External/Internal]Statistics

  2. View:

    • Severity distribution

    • Vulnerability types

    • Counts by category

    • Trends over time

Statisticschevron-right

Reading Attack Paths

Attack Paths show how vulnerabilities chain together to reach a target.

  1. Go to Modules[External/Internal]Attack Paths

  2. Use filters:

    • Severity

    • Vulnerability type

    • Subnet (internal)

    • Certainty

  3. Click a path to see the full chain

  4. View vulnerability details, exploit chain, and metadata

Attack Pathschevron-right

Generating and Downloading Reports

  1. Go to Reports (/app/reports)

  2. Select the assessment scope (domain, entity, time range)

  3. Click Generate Report

  4. Wait for generation to complete (check status if needed)

  5. Download the report (PDF or configured format)

Report Contents

Reports typically include:

  • Executive summary

  • Discovered assets

  • Findings and risk summary

  • Key vulnerabilities

  • Attack paths

  • Test coverage analysis (vulnerability testing coverage)

  • Remediation recommendations

Reportschevron-right

Understanding the Exploit Graph

The Exploit Graph visualizes how vulnerabilities connect and how an attacker could move through your environment.

  1. Go to Attack DashboardExploit Graph

  2. The graph shows:

    • Nodes: Assets (domains, hosts, URLs) and vulnerabilities

    • Edges: Relationships and attack paths

  3. Expand nodes to drill down

  4. Use FTS (Full-Text Search) to find specific nodes

  5. View memories and paths for context

Exploit Graphchevron-right

Last updated