image image image image image image image image

Web Security Platform

  • Scanning vulnerabilities
  • Continuous monitoring
  • Detecting malwares

Scanning vulnerabilities

The most effective ways to protect your website from hacker are early detection of vulnerabilities and appropriate patch management. CyStack Platform provides automatic pentestration services including:

Detect more than 200 dangerous vulnerabilities with OWASP top 10.

Continuous update latest identification systems for vulnerabilities.

Make schedule scan at fixed periods.

Continuous monitoring

CyStack Platform’s security monitoring system let you know the status of your website. You will be warn about abnormalities in security without considering much in technical elements.

Detecting malwares

If your website is attacked by hacker and infected by malwares, we will help you to find out them easily and automatically instead of investigating each file in the source code.

How does CyStack work?

  • Add
    target
  • Verify
    ownership
  • Security
    testing

Add your web application to CyStack Platform

A Target is a domain, a sub-domain or an IP where your web application is deployed. Only websites under your control can be tested in CyStack Platform.

Prove that you are the ownership of your website

Before starting a security analysis with a web application, you need to prove that you are the ownership of the web application. CyStack help you to do this by checking file on Web server and DNS record.

Detect weaknesses in web application

From now, you can use some functions to secure your website comprehensively such as: scanning vulnerabilities and malwares, starting a security analysis.

API intergration

  • CyStack
  • Target
  • Scanning
  • Vulnerability
  • Monitoring

import requests
import json

ROOT_URL = 'https://api.cystack.net/v1'
API_KEY = 'cystackapiexample'
AUTHENTICATION_HEADER = {'Authorization': 'Bearer %s' % API_KEY}


def list_target():
    endpoint = "%s/targets" % ROOT_URL
    r = requests.get(endpoint, headers=AUTHENTICATION_HEADER)
    return json.loads(r.text)

print list_target()
                                

import requests
import json

ROOT_URL = 'https://api.cystack.net/v1'
API_KEY = 'cystackapiexample'
AUTHENTICATION_HEADER = {'Authorization': 'Bearer %s' % API_KEY}


def list_scan():
    endpoint = "%s/scans" % ROOT_URL
    r = requests.get(endpoint, headers=AUTHENTICATION_HEADER)
    return json.loads(r.text)
                                

import requests
import json

ROOT_URL = 'https://api.cystack.net/v1'
API_KEY = 'cystackapiexample'
AUTHENTICATION_HEADER = {'Authorization': 'Bearer %s' % API_KEY}


def list_vulnerability():
    endpoint = "%s/vulnerabilities" % ROOT_URL
    print endpoint
    r = requests.get(endpoint, headers=AUTHENTICATION_HEADER)
    return json.loads(r.text)


print list_vulnerability()
                                

import requests
import json

ROOT_URL = 'https://api.cystack.net/v1'
API_KEY = 'cystackapiexample'
AUTHENTICATION_HEADER = {'Authorization': 'Bearer %s' % API_KEY}


def up_down(target_id):
    endpoint = "%s/targets/%s/monitor_result" % (ROOT_URL, target_id)
    r = requests.get(endpoint, headers=AUTHENTICATION_HEADER)
    return json.loads(r.text)


print up_down("de3b1674-a507-4293-a360-50f8ffe3a921")
                                

We <3 developers

CyStack provides full API for the developers with high requirement. This means that you can manually create a security tool on the platform and the infrastructure of CyStack . The intergration into the available systems becomes easier than ever.

Coming soon