Skip to main content

Asking the Right Questions - Getting the Most Out of 'Dig Deeper'

backBack

Asking the Right Questions - Getting the Most Out of 'Dig Deeper'

AI-Driven Security ToolsDuration5 minutes

Introduction

The 'Dig Deeper' AI-powered chat is designed to provide instant insights and actionable advice for detected vulnerabilities. However, the value it delivers depends on how you interact with it. By asking the right questions, you can unlock deeper insights, alternative solutions, and tailored guidance.

This article offers practical tips on how to maximize the benefits of 'Dig Deeper' by asking effective questions.


Why Asking the Right Questions Matters

Tailored Insights

'Dig Deeper' adapts its responses based on your input. Asking focused, specific questions ensures the AI delivers:

  • Relevant technical details about the issue.
  • Customized remediation strategies.

Problem Solving

With the right questions, you can:

  • Clarify complex vulnerabilities.
  • Explore alternative mitigations when standard fixes aren’t feasible.

Decision Support

Well-formed questions help you:

  • Prioritize remediation efforts.
  • Understand trade-offs between different solutions.

Effective Question Strategies

1. Start with Context

Begin your questions with the specific vulnerability or asset in mind. For example:

  • "Why is this TLS vulnerability considered critical?"
  • "How does this open port impact our attack surface?"

2. Ask About Risks

Focus on understanding the risks associated with the issue:

  • "What are the consequences if this remains unpatched?"
  • "How could an attacker exploit this vulnerability?"

3. Explore Alternative Solutions

If remediation isn’t straightforward, ask:

  • "Are there temporary fixes if we can’t patch immediately?"
  • "What configuration changes can reduce risk?"

4. Dive Into Technical Details

For more experienced teams, technical questions can provide deeper insights:

  • "Which CVE is associated with this vulnerability?"
  • "What logs should we monitor for potential exploitation attempts?"

Examples of Common Questions

Here are some sample questions that work well with 'Dig Deeper':

  1. Risk Assessment
    • "How does this issue compare to other vulnerabilities in terms of impact?"
    • "Is this vulnerability likely to be targeted by attackers?"
  2. Remediation Guidance
    • "What steps should I take to patch this vulnerability?"
    • "Are there additional tools or resources I should use to fix this issue?"
  3. Exploring Scenarios
    • "Could this misconfiguration lead to data leakage?"
    • "What would an attacker gain if this exploit is used?"
  4. Mitigation Planning
    • "How do I minimize exposure until a permanent fix is applied?"
    • "Can restricting access to this service reduce the risk?"

Pro Tips for Getting the Best Results

  1. Be Specific: The more detail you provide, the better the AI can tailor its responses. Mention asset names, vulnerability details, or specific scenarios.
  2. Iterate Questions: Follow up on initial responses to dig deeper. For example:
    • Initial: "What does this vulnerability expose?"
    • Follow-up: "How can we test if this issue has been exploited?"
  3. Prioritize Critical Issues: Focus your questions on high-severity vulnerabilities first to address the most pressing risks.

image.png


Conclusion

Asking the right questions is the key to unlocking the full potential of the 'Dig Deeper' AI-powered chat. By focusing on risks, remediation, and alternative solutions, security teams can gain actionable insights and resolve vulnerabilities faster and more effectively.

In the next article, we’ll share real-world examples of how 'Dig Deeper' has helped organizations respond to security threats.

Frequently Asked Questions

AI-Powered Insights
Can I ask follow-up questions about vulnerabilities?

Absolutely! The 'Dig Deeper' chat is interactive, allowing you to:

  • Request more details about how a vulnerability works.
  • Ask for additional remediation methods.
  • Clarify attack vectors and potential risks.

This ensures security teams get deeper insights beyond just a vulnerability description.

What is the 'Dig Deeper' chat, and how does it help?

The 'Dig Deeper' AI chat provides instant expert-level insights on detected issues.

  • It explains vulnerabilities in a clear, actionable way.
  • It helps users understand why an issue is risky and how attackers might exploit it.
  • It suggests remediation steps tailored to the asset and issue type.

This allows security teams to quickly grasp risks and respond effectively without deep security expertise.

Access & Security
Does this tool comply with security frameworks like NIST or CIS?

Yes, the EASM tool aligns with frameworks such as NIST, CIS, and ISO 27001 by identifying security gaps in publicly accessible infrastructure. While it does not enforce compliance, it helps security teams detect misconfigurations and vulnerabilities that could impact regulatory requirements.

Scanning & Detection
What sources does the scanner use to find vulnerabilities?

The scanner leverages multiple intelligence sources to detect vulnerabilities, including:

  • Public vulnerability databases (CVE, NVD, MITRE, etc.).
  • Security research feeds and threat intelligence sources.
  • Passive reconnaissance techniques such as OSINT and fingerprinting.

By combining these sources, the scanner provides real-time risk assessments without intrusive scans.

Does the scanner perform active exploitation or just passive mapping?

The scanner performs only passive mapping, meaning it identifies vulnerabilities but does not exploit them.

This approach:

  • Avoids system disruptions while gathering security intelligence.
  • Provides safe, real-world attacker perspectives without breaching legal boundaries.
  • Ensures compliance with ethical scanning practices.

Organizations can use these findings to proactively patch weaknesses before attackers do.

How does the EASM scanner find subdomains?

The scanner discovers subdomains using:

  • DNS enumeration (brute-force, dictionary-based, wildcard resolution).
  • Certificate transparency logs that expose registered subdomains.
  • Passive DNS records and web crawling to identify related assets.

This helps map the full attack surface, including shadow IT and forgotten subdomains.

On this page