New Release: July 2020

July 2020

Our vision for AttackForge is centered on few key principals. One of them it that it must make life easy for pentesting teams. AttackForge eliminates boring and repetitive part of pentesting and help pentesters do what they love – break things πŸ˜‰

This month we added a few new features that go long way in that direction.

Reports… The bane of pentesting

What do pentesters hate with passion? Writing reports. From day 1 - AttackForge had ability to generate configurable ad-hoc reports. We significantly widened the ability to customize the reports with AttackForge ReportGen in April this year. ReportGen introduced ability to have completely custom Word templates for reports. Any style. Any font. Any language. As long as it can be put in Word - it can be generated by AttackForge ReportGen.

This month we achieved another milestone in custom report generation – ReportGen is completely integrated within AttackForge itself. And it is accompanied with sample template and video tutorial how to use it.

And – quite important – AttackForge Enterprise allows administrators to build and provide AttackForge users with a library of standard templates. As it should be for Enterprise solution.

Notes taking

We all take notes when we work. You have to take notes when you investigate something that might be an opening in the network perimeter, or suspect packets or headers. Some pentesters use apps on their phones, some write on paper (those might get lost – that’s what usually happened to my notes). So we’ve been asked a lot to add ability to take pentesting notes right into AttackForge project workspace, so pentesters can track and share them if needed. And we did it. Now you can create and store notes on your projects. You can consolidate all of them from apps and pieces of paper in one place. You can have Private notes (those that only you can see), Team notes (available also for your project team) and Report notes (those that will be added to the project report) when you need them.

Even More tools to export and import vulnerabilities

And last but important update for this post – AttackForge now supports sixteen tools and formats in AttackForge Connector – allowing you more flexibility when you need to import and export data to and from AttackForge.  

The following tools & formats have been included in this release:

  • Tenable.io

  • Tenable.sc

  • Netsparker

  • Rapid7 Nexpose / InsightVM

  • Rapid7 AppSpider / InsightAppSec

  • AttackForge JSON – this can be used to import data from any AttackForge project into another AttackForge project. Particularly useful if you are a multi-tenant customer.

  • CSV – this is a generic CSV importer that can work with any data. CSV template is available from within the Connector.

  • Nucleus (our clients love it).

So that’s enough for this month. More features to come in the next one.

For the full set of new features & updates this month – check out the release notes:
https://support.attackforge.com/attackforge-enterprise/release-notes#2020-07-12

Previous
Previous

New Release: August 2020

Next
Next

New Release: June 2020