External attack surface management

See what an attacker already knows about your environment — mapped to the compliance framework you are being audited against.

Dhara runs a passive, evidence-first external scan and returns a report your auditor accepts. No agents. No credentials. No sales call before you see the findings.

The hero asset

A report your founder, compliance officer, and auditor can all read.

One page per finding. Evidence on the left, framework control on the right. Redacted sample below; click through for the full facsimile.

View the full sample report
high*.████-health.example

Wildcard TLS certificate covers retired staging hostnames

Certificate Transparency logs show a wildcard leaf issued 2025-09-12 that still covers subdomains resolving to parked IPs. Past pre-production hosts re-resolved to attacker-controllable CNAMEs.

mediumapi.████-health.example/fhir/metadata

Exposed FHIR metadata endpoint leaks resource types and versions

Anonymous GET returns CapabilityStatement including implementation version, resource list, and OAuth endpoints. Used to enumerate unsupported resources and identify outdated FHIR server builds.

low████-health.example

Missing DMARC policy on primary mail domain

No _dmarc TXT record published. Permits spoofed sender addresses; downstream impact on phishing-based PHI exfiltration. SPF present but not aligned.

Methodology

Passive recon, compliance mapping, next-day delivery. Nothing else.

Passive

Zero packets to your servers. Public signals only — DNS, certificate transparency, historical URLs, tech fingerprints.

No auth needed

No credentials, no agents, no firewall rules. You do not owe us access to see your external posture.

Framework-mapped

Every finding carries the control ID a non-security buyer can hand to their auditor or GRC.

Delivered in 24h

Free report in your inbox the next business day. One page an executive will actually read.

Find out what an attacker would find first.

Free. Passive. In your inbox tomorrow.