Data Visualization & Export
Visualizing Network Footprints
Pulsar provides an interactive interface to explore and understand the relationships between your organization's public-facing assets. Rather than viewing flat lists of data, you can use the built-in visualization tools to map out your attack surface and identify high-risk clusters.
The Asset Relationship Map
The primary visualization tool is the Network Diagram, which dynamically renders the connections between different resource tiers:
- Top-Level Domains (TLDs): The root of your external infrastructure.
- Subdomains: Discovered via integrated tools like OWASP Amass.
- IPv4 Addresses: Resolved endpoints and infrastructure providers.
- Cloud Resources: Buckets, apps, and services identified during scanning.
The diagram uses a node-link architecture where you can click on specific nodes to drill down into technical metadata (e.g., WhatWeb fingerprints, Nmap port states, or SSH audit results).
Vulnerability Scoring & Heatmaps
To help prioritize remediation, Pulsar applies a basic vulnerability score to discovered resources. In the visualization view, these are typically color-coded:
- High Risk (Red): Assets with known CVEs or critical misconfigurations (e.g., expired certificates, dangerous open ports).
- Medium Risk (Yellow): Potential issues requiring investigation (e.g., weak SSH ciphers, information disclosure headers).
- Low/Info (Green/Blue): Standard footprints with no immediate vulnerabilities detected.
Data Export and Reporting
Pulsar supports multiple methods for extracting data, whether you need a high-level report for stakeholders or raw data for further automated analysis.
Generating PDF Reports
For formal documentation, Pulsar utilizes the xhtml2pdf engine to generate snapshots of your scan results. These reports include:
- Scan summary and metadata.
- Asset inventory (Domains, IPs, and Services).
- Vulnerability findings categorized by severity.
To export a report via the UI:
- Navigate to the Scans or Assets section.
- Select the specific scan or organizational scope.
- Click the Export PDF button.
REST API & JSON Export
As a tool designed for integration, Pulsar exposes its entire data set via a REST API. This is the preferred method for exporting data into custom dashboards or SIEM/SOAR platforms.
Example: Fetching Assets via API
GET /api/assets/
Authorization: Token <your_api_token>
Accept: application/json
Response Format:
[
{
"id": 105,
"domain": "api.example.com",
"ipv4": "192.168.1.50",
"vulnerability_score": 7.5,
"services": [
{
"port": 443,
"protocol": "tcp",
"service": "https"
}
],
"last_seen": "2023-10-27T10:30:00Z"
}
]
Raw Data Exploration
For users who prefer reviewing raw technical responses, Pulsar includes an integrated JSON Viewer. This allows you to expand and collapse complex nested data (such as RIPEstat lookups or NVD Data Feed results) directly within the browser without leaving the platform.
Collaboration and Shared Scopes
Pulsar is designed for Red Teams and multi-user environments. Data visibility is governed by an ownership and collaboration model:
- Ownership: The user who initiated a scan or created an asset scope.
- Collaboration Groups: Users can assign assets to specific Django groups. Any user within that group gains read/write access to the scan data and visualizations.
- Filtering: Use the "Collaborations" filter in the dashboard to toggle between your private assets and those shared with your team.
This collaborative approach ensures that discovered infrastructure can be analyzed by multiple team members simultaneously while maintaining strict access control over sensitive footprint data.