Attack surface tests are categorized by their intrusiveness, enabling you to choose more intrusive methods to confirm specific vulnerabilities.
Attack surface tests are classified by their level of intrusiveness. While most tests are benign, some vulnerabilities require more intrusive methods for confirmation. You can choose whether to enable these more intrusive tests, with the various levels of intrusiveness described in the table below.
Intrusivity level | Description | Examples |
|---|---|---|
Level 0: Non-intrusive | No interaction with the target system beyond passive information gathering. The system remains completely unaffected by any tests. |
|
Level 1: Minimal interaction | Basic interactions that involve standard requests without altering the system state or data. Any changes are confined to volatile memory and do not persist. |
|
Level 2: Temporary modification | Makes temporary and fully reversible changes to the system. Modifications do not impact normal operations and can be undone without lasting effects. Cleanup is not necessary, but can be done. |
|
Level 3: Reversible changes | Introduces changes that persist but can be reversed with your actions. These changes may slightly impact normal operations, but are recoverable. |
|
Level 4: Significant impact | Makes significant changes that are not easily reversible. These actions may disrupt services or alter system data. |
|
Level 5: Full compromise | Actions that fully compromise the system, leading to irreversible damage, persistent backdoors, or extensive disruption. |
|