HackerTarget integration with Snapsec ASM
The HackerTarget integration enhances Snapsec ASM by performing lightweight OSINT-based reconnaissance on your domains.Once configured, ASM can automatically fetch subdomains, open ports, HTTP services, and exposure indicators discovered by HackerTarget’s public scanning APIs. This integration helps teams expand their visibility into unknown or shadow assets without running intrusive scans.
1. What this integration does
Once installed, Snapsec ASM can use HackerTarget to:- Enumerate subdomains
- Identify open ports exposed on the internet
- Detect running HTTP services
- Highlight potential exposures found via OSINT
- Automatically associate discovered assets with your ASM inventory
2. Prerequisites
Before installing the integration, ensure you have:- A domain added in Snapsec ASM
- Internet access from Snapsec to HackerTarget APIs
- (Optional) HackerTarget API key for extended rate limits
3. How to Install
- Navigate to ASM → Integrations
- Locate HackerTarget
- Click Install
- (Optional) Enter your HackerTarget API key
- Save the configuration
4. How data is fetched
Snapsec ASM uses multiple HackerTarget API endpoints to enrich discovery:/hostsearch— discover subdomains/nmap— detect open ports/httpheaders— identify running HTTP services
- Normalized
- Classified
- Added to your ASM asset inventory
- Tagged with the HackerTarget adapter
5. Monitoring Scan History
After installation, results appear in:- ASM → Scans
- ASM → Asset Catalog → Subdomains / IPs / Ports
- Discovery Logs, which show timestamps and fetched results
“Discovered via HackerTarget adapter”
6. Removing or Updating the Integration
To modify or remove:- Go to ASM → Integrations
- Open HackerTarget
- Update the API key or click Uninstall
Next Steps
View ASM Asset Catalog
Explore all assets discovered through HackerTarget and other adapters.