shield-quarteredThe FullHunt Module

Expose Your Attack Surface

The FullHuntarrow-up-right module allows you to dynamically scan the External Attack Surface of the infrastructure of your organizations. Your attack surface is essentially "what the hackers see" of your infrastructure.

The integration allows Liberty91 to keep an always up-to-date view of your unique threat-profile. We will know what you're hosting, and where. This means Liberty91 can provide you with the most relevant Threat Intelligence possible. Is a new zero-day being discussed in any of your sources? You will immediately be notified, complete with an assessment of the threat, where your exposed assets are hosted, and what you should probably do about it.

The FullHunt is one of the most popular Managed Integrations available. That means it is fully managed by Liberty91 for you, and can be included as an add-on to your license.

For those who already have a FullHunt Enterprise License, and want to integrate with Liberty91; follow these steps:

1

Find your FullHunt API-key

in the FullHunt portal, get your Enterprise API-key for your account.

2

Find your organization ID

In the FullHunt portal, go to 'organizations'. Click on the organization you want to integrate with one of your organizations in Liberty91. You will find the unique ID for that organization in the URL of the page you have just opened. It will be a long, hexadecimal string, in this format:

3

Provide your identifiers in the Liberty91 Portal

In Liberty91, go to Modules > FullHunt Module. There, provide your FullHunt API-key in the designated field, and copy the organization IDs of your FullHunt organizations with the corresponding Liberty91 organizations.

4

Sit back and relax

As soon as you click 'update', Liberty91 will pull all the relevant data from FullHunt, and populate and enrich your Organization's assets with relevant data.

circle-info

Liberty91 will create Threat Assessments for each asset you import with FullHunt. These will provide you with the latest relevant vulnerabilities, exploits or breaches relevant to your assets. Your morning reports will from now on also include a dedicated chapter about threats to your exposed assets.

Last updated