Skip to main content

Asset Discovery

Overview

The Assets page provides visibility into your organization's external attack surface. Discover domains, subdomains, IP addresses, and web servers.

Asset Types

Domains

Your registered domain names:

  • Primary domains (yourcompany.com)
  • Product domains
  • Marketing domains
  • Legacy domains

Subdomains

Discovered subdomains:

  • app.yourcompany.com
  • api.yourcompany.com
  • staging.yourcompany.com
  • internal.yourcompany.com

IP Addresses

Associated IP addresses:

  • Web servers
  • API endpoints
  • Mail servers
  • DNS servers

Web Servers

Running web services:

  • Technologies detected
  • Ports open
  • Certificates
  • Screenshots

Adding Domains

Manual Addition

  1. Navigate to InfrastructureAssets
  2. Click Add Domain
  3. Enter domain name
  4. Verify ownership (DNS or file)
  5. Confirm addition

Domain Verification

Prove domain ownership:

DNS Verification:

Add TXT record: bastion-verify=abc123xyz

File Verification:

Create file: /.well-known/bastion-verify.txt
Content: abc123xyz

Discovery

How Discovery Works

  1. DNS Enumeration

    Query DNS records for subdomains.

  2. Certificate Transparency

    Search CT logs for issued certificates.

  3. Web Crawling

    Follow links to discover related assets.

  4. Port Scanning

    Check for open ports and services.

  5. Fingerprinting

    Identify technologies and versions.

Discovery Methods

MethodWhat It Finds
DNS RecordsA, AAAA, CNAME, MX, TXT
CT LogsAll issued SSL certificates
Brute ForceCommon subdomain names
Historical DataPreviously seen subdomains
Web ScrapingLinks in web pages

Running Discovery

  1. Select domain
  2. Click Run Discovery
  3. Choose depth (quick/standard/deep)
  4. Wait for completion
  5. Review new findings

Asset Details

Domain Details

Click on a domain to view:

  • Registrar information
  • DNS records
  • SSL certificates
  • Associated subdomains
  • Historical data

Subdomain Details

For each subdomain:

FieldDescription
IP AddressResolved IP
StatusActive/Inactive
TechnologiesDetected stack
PortsOpen ports
Last SeenRecent activity
ScreenshotVisual preview

IP Address Details

For each IP:

  • Hosting provider
  • Location (geo)
  • Open ports
  • Associated domains
  • Service banners

Screenshots

Automatic Screenshots

Bastion captures screenshots of web assets:

  • Homepage appearance
  • Visual change detection
  • Defacement monitoring
  • Content verification

View all screenshots:

  1. Go to AssetsScreenshots
  2. Browse by domain/subdomain
  3. View current and historical
  4. Compare changes over time

Technology Detection

Detected Technologies

CategoryExamples
Web Servernginx, Apache, IIS
FrameworkReact, Angular, Django
CMSWordPress, Drupal
CDNCloudflare, Akamai
AnalyticsGoogle Analytics
SecurityWAF, CAPTCHA

Why It Matters

Technology detection helps:

  • Identify vulnerable versions
  • Understand attack surface
  • Prioritize patching
  • Plan penetration tests

Asset Classification

Status Labels

StatusMeaning
ActiveCurrently in use
InactiveNot responding
UnknownNeeds investigation
ExcludedIntentionally ignored

Classification

Categorize assets:

  • Production
  • Development
  • Staging
  • Legacy
  • Third-party

Ownership

Assign owners to assets:

  1. Select asset
  2. Click Assign Owner
  3. Select user/team
  4. Save

Excluding Assets

When to Exclude

Exclude assets that are:

  • Not owned by your organization
  • Intentionally public
  • Known and accepted risks

Creating Exclusions

  1. Select asset
  2. Click Exclude
  3. Provide justification
  4. Set expiration (optional)
  5. Confirm

Monitoring

Change Detection

Monitor for changes:

  • New subdomains discovered
  • IP address changes
  • Technology changes
  • Certificate expiration
  • New open ports

Alerts

Configure alerts for:

Alert TypeTrigger
New AssetNew subdomain discovered
High RiskCritical vulnerability found
ChangeConfiguration changed
CertificateSSL expiring soon

Reporting

Asset Reports

Generate reports:

  • Full asset inventory
  • New assets this period
  • Asset changes
  • Risk summary

Export Formats

  • PDF report
  • Excel spreadsheet
  • CSV data
  • JSON export

Best Practices

Regular Discovery

Run discovery regularly. New assets appear as your organization grows.

Verify Unknown Assets

Investigate unknown assets. They may be shadow IT or attacker infrastructure.

Assign Ownership

Every asset should have an owner responsible for its security.

Remove Unused Assets

Decommission unused assets. Forgotten systems are easy targets.

Next Steps