Phobos
Orbital Discover your true attack surface
Holistic external risk surface detection and enumeration See what real attackers see Find misconfigs and exposures no other platform can detect!

Discover your true attack surface

Phobos Orbital is designed to illustrate where real attackers would attack, and why. Orbital will discover Attack Pathways which make quick work of exposed risk surfaces, indicating the most lucrative entrypoints available for exploitation.

700 page reports with 4 column wide CVE references don't help when solving real security problems - showing you where attackers would go first, with plain-language reporting does.

Attack pathways

Attack Pathways(tm) are a novel technique to describe how a series of informational, low and medium tier findings can be chained together to form criticals and highs! Orbital produces these programatically based on the findings in every report! Attack Pathways(tm) provide the perfect avenue to gauge at a glance how findings every other scanning platform ignores or makes light of can be leveraged by attackers in ways ignored completely by contemporary scanning platforms, and compliance frameworks.

Plain English reporting

No CVE references, no DREAD, no STRIDE, no att&ck framework - plain english. Instantly actionable reports you can share with anyone. The days of multi-hundred page reports consisting of the same copypasted "ping is a medium finding" and "here's how to fix XSS and SQLI" are over.

Technology Breakdown

Identify the Tech Stack of a given organization. Often just looking at the technology used telegraphs quite a lot to attackers. Multiple security appliance providers have had multiple RCE problems in the last 2-3 years. Clawedbot is a thing now, npm apps, s3 buckets and other tooling expose sensitive files leading to breaches every day!

Identify juicy hosts

Get an idea of what a given host is responsible for based on its DNS names. Internal IP? Dev and Staging language in it's name? Probably a soft target, probably not hardened. Attackers look for easy ways in, and this is how they do it. Who sends dev/stage/qa logs to the SIEM? It's too much noise! Attackers know that, and it's where they strike.

Orbital gets straight to the meat.

Domain discovery icon

Discovers additional domains and organizations

Discover what other domain names and organizations are adjacent to your inquiry! Orbital can show you how organizations can overlap at the technology level, giving way for attackers to have multiple avenues of attack.

Favorable/unfavorable tech icon

Favorable & unfavorable technology

Identify “juicy targets”: publicly accessible assets, leaks, appliances/software with known issues, and combined findings for attacker success. At the end of the day, the decision tends to be "go" or "no go", and by classifying assets into favorable or unfavorable, we help make the decision process easy!

Screenshots icon

Screenshots

Visually verify what’s exposed and what changed, fast. In many cases, just seeing the screenshot of what has been exposed is enough to make a decision.

Internal host discovery icon

Internal and external hosts

Orbital can discover internal assets using only publicly available data. See what leaks “behind the curtain” and how attackers use it for intel.

Open port discovery icon

Exposed services enumerated

In many cases, host firewalls or cloud dashboards can be a pain, and are easy to misconfigure. Findings like these are easily spotted with Orbital!

Leaked credentials icon

Leaked credentials

Gold for attackers. Orbital surfaces exposed credentials to identify likely ingress opportunities.

Executive report icon

Executive report

One page. Plain english. Looking at the executive report for 60 seconds will show you more about your environment than looking at a 600 page report full of corporate fluff for any amount of time (plus your eyes dont bleed!)

Exhaustive findings icon

Exhaustive findings

Orbital’s sweeps are exhaustive, and often turn up findings nobody knew existed. We only display real findings, no fluff, padding, or repeating the same text over and over again to pad the report.

Click any image to zoom.

Orbital is is a straightforward way to handle external inventory + continuous perimeter monitoring + audit-friendly evidence. Where a framework requires a specific scan vendor (ex: PCI ASV), Orbital is the “make sure nothing surprises you” layer.

Framework mapping (with section references)

PCI logo
PCI DSS (v4.0.1)
Refs: Req 11.3.2 (external ASV scans, quarterly), 11.3.2.1 (after significant change), 11.3.1 (internal scans).
NYDFS 23 NYCRR 500
Refs: § 500.5(a)(1)-(2) (annual pen test + automated scans), § 500.5(b)-(c) (monitoring + remediation).
FTC logo
GLBA / FTC Safeguards Rule (16 CFR Part 314)
Refs: § 314.4(b) (risk assessment), § 314.4(d)(1)-(2) (testing/monitoring; pen testing & vuln assessments), § 314.4(d)(2)(i)-(ii) (annual pen test; vuln assessments at least every 6 months).
FedRAMP logo
FedRAMP (Rev 5 ConMon)
Refs: Vulnerability Scanning (monthly scans; 100% inventory), ConMon Playbook (CM-8 inventory monthly).
NIST logo
NIST SP 800-53 Rev 5 (control evidence)
Refs: RA-5 (vulnerability monitoring & scanning), CM-8 (system component inventory).
ISO logo
ISO/IEC 27001:2022 (Annex A)
Refs: A.5.9 (asset inventory), A.8.8 (technical vulnerabilities).
CIS Controls logo
CIS Controls v8.1
Refs: Control 1 (asset inventory), Control 7 (continuous vulnerability management).
SWIFT logo
SWIFT Customer Security Controls Framework (CSCF)
Refs: Control 2.7 (Vulnerability Scanning).
HIPAA Security Rule
Refs: 45 CFR 164.308(a)(1)(ii)(A) (Risk Analysis), 164.308(a)(1)(ii)(B) (Risk Management).
SOC 2 (TSC)
Refs: CC7.1 (detect/monitor for new vulnerabilities & susceptibility changes).
EU DORA (Regulation (EU) 2022/2554)
Refs: Article 6 (ICT risk management framework).
EU NIS2 (Directive (EU) 2022/2555)
Refs: Policy, Article 21 (risk-management measures).
Requirement intent
Orbital Supplies
Audit / program outcome
External asset inventory
Know what’s exposed (domains, hosts, cloud edges).
Domains, ports, tech stack
Perimeter scope + adjacency discovery.
Scope control
Fewer “unknown unknowns” in audits and assessments.
Continuous monitoring / drift detection
Catch new exposures quickly.
Time-series changes
Orbital provides scan diffs!
Evidence stream
Supports monitoring/testing narratives and BAU reporting.
Information leakage
Sensitive details not classified with CVES or as bugs
Internal host discovery + leaked creds
Misconfigurations will leak internal DNS names and IPs
Risk analysis backing
It's hard to argue with screenshots

Billing options available: Monthly, Quarterly or Anually.

Once you sign up for a trial and run your first report, you'll know how many hosts Orbital found, and which pricing tier will be assigned!

1-100 hosts
101-499 hosts
500-999 hosts
1000+ hosts
$100 monthly
$250 monthly
$500 monthly
$2000 monthly

Let Orbital show you what's on your perimeter today!

Orbital can help you get a 100,000 foot view of your organizational perimeter, be it in the cloud, on premise, or across various hosting and technology providers. See what attackers see, and tune your risk surfaces!

Free trial Back to Features