About Externalsight
External Attack Surface Management · Built for security teams who need to find what attackers find.
What We Build
Externalsight is an External Attack Surface Management (EASM) platform. It automatically discovers every internet-facing asset your organization controls — domains, subdomains, open ports, TLS certificates, cloud storage, email infrastructure, and exposed APIs — using the same data sources attackers consult before a single exploit attempt.
Every discovered asset is then scored across 8 weighted security categories on a 0–100 scale, with findings classified by severity (CRITICAL through INFO) and paired with actionable remediation steps. The entire pipeline runs in under 4 minutes, agentlessly, with no changes to your infrastructure required.
How It Works
The scan pipeline runs 48+ concurrent security scanners organized into 4 sequential phases:
- Phase 1 — DNS / SSL / HTTP: Certificate validity, cipher configuration, HTTP security headers, DNSSEC, SPF, DKIM, and DMARC posture.
- Phase 2 — Discovery: Subdomain enumeration via certificate transparency logs and passive DNS, open port scanning, technology fingerprinting, GraphQL and API endpoint detection.
- Phase 3 — Secrets & Exposure: Credential breaches via HaveIBeenPwned, exposed secrets on GitHub and DockerHub, cloud storage exposure (S3, GCP, Azure, Firebase), phishing domain detection, and IP reputation.
- Phase 4 — Advanced Intel: ASN and reverse WHOIS discovery, CVE enrichment against the National Vulnerability Database, WAF/CDN detection, CORS misconfiguration analysis, subdomain takeover candidates, admin panel exposure, and sensitive file checks.
Results flow through a chain engine that applies cross-scanner correlation rules — identifying compound risks that are more dangerous together than individually — before being scored, enriched with OWASP, NIST, MITRE ATT&CK, and CVSS framework references, and stored with full remediation guidance.
Our Approach
Deterministic, not generative. Every finding Externalsight surfaces is backed by concrete, reproducible network evidence. If the platform flags a missing DMARC record, the DNS record physically does not exist. If it flags an exposed S3 bucket, the scanner received an unauthenticated HTTP response from that bucket. We do not use generative AI or heuristic guessing to produce findings.
Non-destructive. Externalsight is strictly a non-exploitation platform. It does not execute malicious payloads, attempt privilege escalation, brute-force authentication portals, or exploit any vulnerability it discovers. Even the active DAST probes use safe, alphanumeric-only markers and read-only patterns.
Outside-in. The platform operates from the public internet — exactly as an external attacker would — with no agents, no firewall changes, and no code deployed to your infrastructure. The asset inventory is built by the tool from your root domain outward, not handed to it.
Continuous. A one-time scan tells you what your surface looked like on a specific day. Background monitoring runs the full discovery and scan pipeline repeatedly, comparing each result against the previous baseline. New subdomains, security regressions, and exposure changes trigger alerts immediately.
The Team
Externalsight is built by a security-focused engineering team with backgrounds in application security, infrastructure, and external threat research. The platform was designed to solve a specific problem: most organizations scan the assets they know about. Attackers find the ones they don't.
Our founding insight was that the gap between what a security team has documented and what is actually reachable from the internet is where external breaches consistently start. Externalsight closes that gap with an automated, continuous, evidence-backed platform.
Get in Touch
For technical support, security disclosures, or partnership inquiries, reach us at externalsight.team@gmail.com.