Qontrol

External Surface

See what an attacker would see

From a simple domain name, the platform maps your client's entire exposed surface. Vulnerabilities, emails, data leaks, subdomains: a passive, non-intrusive scan that delivers a complete diagnostic in minutes.

Vulnerabilities

Flaws detected on exposed assets

Automatic detection
The scan identifies vulnerabilities on all servers and services exposed on the internet. Each flaw is classified by CVSS score.
Prioritization by severity
Three severity levels: critical (7.0-10.0), medium (4.0-6.9) and low (0.1-3.9). You immediately know what requires urgent action.
Asset inventory
Every domain, service, application and open port discovered receives a security rating and maximum CVSS score.
Product screenshot

Email security

Email configuration weaknesses detected

SPF verification
Checks that only authorized servers can send emails from your client's domain. First line of defense against spoofing.
DKIM signature
Verifies the presence of a digital signature guaranteeing the authenticity of sent emails. Protects against in-transit tampering.
DMARC policy
Evaluates the policy for handling unauthenticated emails. An overall grade is assigned based on the combined SPF, DKIM and DMARC configuration.
Email configuration weaknesses detected

Data leaks

Compromised credentials in breaches

Disclosed credentials
Searches for domain email addresses that appeared in known data breaches. You know which accounts are exposed.
Weak passwords
Detects weak or reused passwords present in leaks. A critical alert signal for the organization's security.
Compromised hashes
Identifies compromised password hashes. Even without knowing the plaintext password, the hash is enough for targeted attacks.
Product screenshot

Subdomains

Complete mapping of the exposed surface

Exhaustive discovery
All exposed subdomains, services and applications are discovered automatically. You reveal assets often forgotten or unknown to your client.
Global security score
A score from 0 to 100 indicates the overall security posture. Each asset receives its own rating to identify weak links.
Complete PDF report
Export a professional report with executive summary and technical details. Ready to hand to your client for a structured discussion.
Complete mapping of the exposed surface