2024
15 November 2024
Powered-up Project Forms!
Suggested Values
We've extended AFScript to Project Form Fields!
This means you can now suggest values (and soon automatically set values) using AFScript.
For example, you can:
Suggest a project or vulnerability code based on your own algorithm
Suggest a project budget based on the testing types
Apply logic to your custom fields
To get started, head over to Administration -> Projects
and click on Configure
for the Suggested Value on the field:
Then add your code based on how you want your field to suggest its value.
TIP: You can modify the test context and run your code to make sure it's working as expected 😊
Configure Sections, Re-order Your Form!
You can now configure sections and re-order all fields on the project form.
This provides the ultimate flexibility 🧙 with how you want and need your forms to look.
TIP: Use Hide Expressions to make your fields and sections conditionally display or hide based on your needs
Vulnerability Code Limits Removed
We have removed the character limitations on the vulnerability code field, providing you with freedom to create however long or short vulnerability codes you need!
Exciting UX Improvements
New Modal Experience for Writeups
At AttackForge, we're on a mission to make your daily tasks as easy as they can get.
Creating and editing Writeups on Vulnerabilities should be effortless. And we've made it so!
Now when interacting with a Writeup on a Vulnerability, you will get a new modal experience. This makes it easier to make your changes and go straight back to finishing your vulnerability.
We've also made it possible to duplicate a Writeup and select the destination library in one action - saving time and effort!
Inline Code Snippets
We've added support for inline code snippets in the rich-text fields.
The inline code will automatically show in your reports, however you can set a custom style if preferred.
COMING SOON! More options to style your data in rich-text fields
Sessions No Longer Timeout When Actively Entering Data
As the title says ☝️😉
Better Management of Select Field Options
We've re-designed the way options are created and managed in Select
and Multi-Select
custom fields.
We've also removed the limitation in the user interface for how many options can be set and configured.
Asset ID Now In Tables and CSV Export
You can now copy and filter Asset Ids
in the table, and also export Asset Ids in the CSV.
Assets Module - Uncatalogued Assets
If you're using the Assets Module then you're going to enjoy this.
Previously you could set custom access controls for your Catalogued Assets
- Assets which belong to libraries.
We've now extended the ability to set access controls for Uncatalogued Assets
too!
You have full control over who can, and cannot, view, create and edit uncatalogued assets.
Improvements to AFScript
Not only did we extend the use of AFScript, but we also added support for even more built-in libraries and functions! 💪
This creates even more possibilities for how you might want to create your own logic in AttackForge!
Enhancements to Self-Service APIs
We're always improving our Self-Service APIs to make automations and integrations even easier!
New Events:
Project Retest Requested
Project Retest Completed
Project Retest Cancelled
New RESTful endpoints:
Create Portfolio
Update Portfolio
Archive Portfolio
Download Vulnerability Library (Writeup) File
Updates to REST endpoints:
All Get Vulnerability Related Endpoints
- now returnvulnerability_library_files
All Writeup Related Endpoints
- now returnfiles
Have you tried our Events API yet? It's perfect for real-time integrations with your scanners, ticketing tools, analytics and data lakes.
Improvements to ReportGen
We've improved pie charts in reports to better handle labels.
Labels will now automatically resize to make sure they are always visible and legible.
We've also added new support for custom inline code styles.
24 September 2024
Introducing AFScript - Your Custom-Code Powerhouse!
We're excited to announce AFScript - an interpreted programming language built by the engineering wizards 🧙 at AttackForge, to help you customize and personalize YOUR AttackForge even more! 💪
AFScript can help you in many different ways:
Changing application logic to better align with your preferred workflows.
Driving new behaviour in forms and their respective sections and fields.
Creating in-app automations for your projects, vulnerabilities, assets and more.
Applying pre-and-post data transformations when saving, updating or exporting data.
Building bespoke dashboards and analytics that matter to you.
AFScript is the next generation in empowerment for AttackForge customers. It comes off the back of the successes we’ve had with Hide Expressions (custom fields and sections, vulnerability SLAs, custom vulnerability parsing) and Filter Expressions (custom emails, APIs) which have provided customers with ways to make AttackForge their own.
We built AFScript to provide a safe and secure path to apply your own code to your AttackForge application, in a performant manner and without creating any security holes.
Importantly, the language itself is not executable - for peace of mind.
The language was built to look-and-feel like JavaScript to make it familiar and easy to use for security teams, pentesters and software engineers.
It comes with a modern and optimized code editor similar to VS Code, making it familiar and effortless to write powerful scripts.
In this release, you can use AFScript to change the logic for how project status is calculated.
Some examples you can consider:
For more information on AFScript, how it works and how to use it - please visit our Support Centre
Custom Views for Tables
We've added support for our tables to allow you to save your favourite and frequently used table views!
You can now easily configure and switch between different views providing flexibility in how you want to see your data.
Each view is saved against your own personal user settings, so you can tailor each view to exactly how you want it.
And best of all - you can create as many views as you need!
Each view is unique. You can save the following information and table state for each view:
Table filters
Column visibility
Column filters
Column ordering
Column sorting
Column locking
Column features
Table scroll
Every view gets its own name. You can also duplicate views to create similar ways of seeing your data.
We also support re-ordering your views, making it easy to switch between frequently accessed data.
Custom views has already made its way to Projects, and will be rolling out across the app to other tables in the coming weeks.
UX Improvements
We've added support for indented lists! Yes, we should have had it a long time ago. We know. Be glad it's here now and supported in your reports too! 😊
Infinite scroll was causing you pain? Yeah we didn't really like it much easier. We've now changed it so you have a better experience scrolling those longggg lists 😎
We also combined the selection of the Writeups library and Writeup itself into a single form field, making it easier to search and select your Writeups in one place!
We've added a new email tag to help admins know who invited a user to AttackForge. For more info visit Notifications.
We've also added support for custom informational message to show on Visibility
field when creating or updating vulnerabilities. This helps to provide your own guidance to your testers on when to set vulnerabilities as visible or as pending.
You can now also set a default value for the project code field on project requests.
ReportGen Improvements
ReportGen v2.10.7 is out! 🚀
Along with this update, you now get:
Support for indented ordered and unordered lists.
Support for Dynamic Variable Names when using the $declare, $push and $value functions.
We've added Assigned Assets and Assigned User as additional data points you can now access on all Test Cases.
We fixed an annoying bug that may have caused your report to show a 'Broken XML' error message in Word when opened under certain conditions.
Improved Logging
Let's face it. Logs are important. So we improved our logging to give you even more information!
Now you can extract the following information for every API request!
HTTP method
URL
Request path
Request query parameters
Request body
API endpoint name
HTTP status code
User Id
Project Id
Source IP address
Event details
Timestamp
Logs are available in-app and via the Self-Service APIs.
21 August 2024
Enhanced Image Support and File Management
We've introduced better file management and image support! You can now:
Copy and Paste images and files directly from your clipboard into rich-text fields
Drag and Drop images and files directly into rich-text fields or within drop-zones
Upload files at any time - even before saving the form
Preview images and add captions directly within rich-text fields
Expand rich-text fields to full-screen for maximum efficiency
File manager accessible within rich-text fields
Adding images and files from your clipboard or via drag & drop is now a piece of 🍰
You can also upload files now at any time! You no longer need to wait until you have saved the form.
Adding captions is even easier now that you can add them in-line whilst you work.
Need more space to work? You can now expand your rich-text fields to full-width, giving you more space to create or review information.
You now have access to the file manager directly within your rich-text fields. This makes it easy to manage files and images, and insert the ones you need with one-click.
New Pentest Report Template is Out!
We've been working hard behind the scenes improving on the most powerful 💪 reporting engine - ReportGen.
We've just released Pentest Report Template v3.4
(example | template) to help share examples on how you can improve your own reports!
This template takes advantage of many of the new features and capabilities introduced into AttackForge and ReportGen over the past several months.
Pentest Report Template v3.4 includes the following:
New Section: Document Control
New Section: Version Control
Updated: Project Team
Re-designed: Executive Summary
New Section: Background
New Section: Approach
New Section: Methodology
New Section: Out-of-Scope
New Section: Customer Goals
New Section: Testing Team Goals
New Section: Assumptions and Constraints
New Section: Summary of Recommendations
New Section: Positive Security Observations
Re-designed: Retesting History
Updated: Summary of Findings
Re-designed: Vulnerabilities
New Section: Unique Vulnerability Details
Cloud Testing Methodologies Now Available
We have just added five (5) new Cloud Configuration Testing Methodologies.
You can now import any of these methodologies into your Test Suites
You can download these methodologies from the AttackForge GitHub.
New Custom Time-Based Emails: Writeups
You can now configure Writeups
in your custom time-based emails.
This means you can now:
Get an email update daily/weekly on newly created or modified Writeups
Notify maintainers on changed Writeups in a custom library
Get updates on Writeups that meet your specific criteria, even custom fields!
Invite User by Email Address
You can now invite users to AttackForge directly by email address within the Users module. Invited users will receive an email with an activation link which takes them to a page to finish setting up their profile.
Column Freeze on Table Scroll
You can now lock columns as you scroll your tables. This makes it easier to keep the important information always within view. You can also lock multiple columns giving you more control over your tables and data.
Improved Table Custom Fields
We have made significant improvements to table custom fields. You can now:
Click on a table row to view or edit the full data in a modal window
Filter and sort on individual columns
Expand table into a modal window, for advanced filtering and search
Bulk actions when editing table rows
Support for pagination
Exploitability and Custom Tags now Optional
We have made Exploitability
and Custom Tags
optional fields. You can now switch off these vulnerability fields within Administration -> Vulnerabilities
.
View Visible, Pending and All Vulnerabilities
You can now view visible, pending and all vulnerabilities on your project. This makes it easier to view and action all vulnerabilities in a single table.
Access Detailed Asset Information from Vulnerabilities
You can now open the Asset page to access detailed information on assets, directly from your vulnerabilities.
Self-Service API Improvements
We made a bunch of improvements to our Self-Service APIs namely:
Major updates to REST endpoints:
Create Writeup & Update Writeup
- we added support for creating and editing Writeups in theProject Library
.All Get Vulnerability APIs
- we added support for querying onPending
vulnerabilities.
Have you tried our Events API yet? It's perfect for real-time integrations with your scanners, ticketing tools, analytics and data lakes.
5 July 2024
New Feature: Project Pages
We've introduced a new feature on projects - Pages - which can be used to create, group and manage custom content on your projects.
Pages are a dynamic way to interact with your project teams. Their content can also be used in reports and in the Self-Service APIs.
Here's some examples for how you can use Pages:
Create dedicated places for project teams to enter and track information
Provide additional options for teams to collaborate
Group content into topics
Each page comes with its own access controls to manage who can View, Upload or Edit content on the page.
For this first release, we have made a Summary page available. You can control which sections and fields can be created on this page. Some examples might include:
Customer Goals for the testing team, and Testing Team goals for the customer
Assumptions, Constraints and Limitations
Scope-related notes such as Out-of-Scope
We will be adding more pages in the future to provide even more flexibility on how you can use your projects.
Reporting Enhancements
We have extended the capabilities of the Reporting section on your project.
You can now create custom sections and custom fields to personalize your Reporting data to the project.
Some ideas for sections and fields you can now create:
Project Summary - including Executive Summary, Summary of Recommendations and Positive Security Observations
Testing Overview - including Background, Approach and Methodology
Document Control - including Author(s), Reviewer, Approver and Version History
Dont forgot to try Hide Expressions on Custom Fields to make your Reporting tailored to your project.
Check out GitHub AttackForge ReportGen site for details on how to add these fields to your reports
Project Features
You can now personalize your project experience even further with Project Features.
Project Features are a new way to help you:
Control when Test Cases are viewable on a project, and by whom.
Determine if Retesting is needed, and who can have access.
Determine if Attack Chains are relevant, and who can have access.
Determine if Reporting is needed, and when Reporting section and downloadable reports are made available.
Every feature comes with access controls for better management of information and workflows
Self-Service API Improvements
We made a bunch of improvements to our Self-Service APIs namely:
New REST endpoint: Create Project Test Case
This endpoint can be used to create dynamic test cases on the project, for example you could import all of the checks that your scanner performed to provide better and programmatic testing coverage
Major updates to REST endpoints:
Update Test Case - we updated this API to provide the full suite of options when it comes to managing your project test cases. You can even insert custom fields on your test cases via the API!
Get Project Test Cases - we updated this API to provide more comprehensive information about the test cases, such as linked vulnerabilities, assignment to project scope, and assignment to tester.
Minor updates to REST endpoints:
Get Project, Get Projects, Get Projects and Vulnerabilities & Get Projects by Group - now supports project_scope_details
Create Vulnerability, Create Vulnerability Bulk, Create Vulnerability With Library - now supports linked_testcases
Update Vulnerability & Update Vulnerability With Library - now supports project_id and linked_testcases
Get Vulnerability, Get Vulnerabilities, Get Vulnerabilities by Group, Get Vulnerabilities by Asset, Get Project Vulnerabilities & Get Projects and Vulnerabilities - now supports vulnerability_testcases
Have you tried our Events API yet? It's perfect for real-time integrations with your scanners, ticketing tools, analytics and data lakes.
UX Improvements
We've added new email notification settings which can be configured to determine who gets notified when Project Requests
are either created or updated. You can configure this from Administration -> Notifications -> Project Requests
.
We've improved the experience after creating a Vulnerability
or a Writeup
. You now have options to create another, create and view or go straight to evidence upload.
We also improved the Administration
module navigation experience to make it easier to find the configuration settings you need.
18 June 2024
Customize Vulnerability and Project Colors
You can now customize your vulnerability and project colors!
Personalize your AttackForge and make it your own. Tailor your color scheme to match your identity and messaging.
You can now change the following color options in the Administration module:
Vulnerability priorities
Vulnerability statuses
Project statuses
Project Request statuses
We've also lightened the status colors to blend in better with the rest of the application, and to keep the eyes focused on the most important messages on the page.
Assign Users and Groups to Manage Project Teams
You can now assign users and groups to be responsible for managing access to individual projects.
This can help you to:
Empower customers and engineering teams to provide access to the project and vulnerabilities on a needs basis.
Delegate project team management to persons better suited for the role.
Save time and effort on project team management.
When assigning a user or a group to manage access to the project, you can configure the following:
Access Level Limit: Set the highest level of access the user or group is allowed to assign to project team members.
Add User Method: Configure how project team members can be added - either by selecting an existing user from a drop-down list, or by entering in an email address.
Allow User Invite: Allow user to invite new persons to your AttackForge tenant.
Delegate User Management of Groups
You can now delegate management of your groups to other users and groups.
This can help you to:
Empower customers and engineering teams to manage stakeholder access to relevant projects and project requests.
Delegate security teams to manage groups on a needs basis.
Reduce the burden on application administrators.
When assigning a user or a group to manage access to the group, you can configure the following:
Project Access Level Limit: Set the highest level of access the user or group is allowed to assign for access to the groups' projects.
Project Request Access Level Limit: Set the highest level of access the user or group is allowed to assign for access to the groups' project requests.
Add User Method: Configure how group members can be added - either by selecting an existing user from a drop-down list, or by entering in an email address.
Allow User Invite: Allow user to invite new persons to your AttackForge tenant.
You can now also set
None
for group members access to Projects and Project Requests.
Invite Users to Projects, Groups and AttackForge
You can now allow specific users or groups to invite other users to your AttackForge.
This makes it convenient to get access to the right people, quickly and without the need to involve application administrators.
This can help you to:
Empower customers to invite their engineering teams directly to the relevant projects or groups.
Delegate account managers to better manage their customer accounts.
Share vulnerability information faster, to help remediate vulnerabilities sooner.
When combined with the new project team and group membership administration options (above) - this feature provides full autonomy for user management!
SSO Improvements
We have now enabled support for two (2) independant identity providers (IdPs) which each can be supported with their own unique configurations, including SSO User Role Mappings.
We have also now added the option to disable Just-In-Time SSO user creation, helping to restrict access to AttackForge via SSO to users whom have been invited only.
ReportGen Enhancements
We have added support for additional project team member data in reports, namely About Me
. See example below:
We also added an extra option for Charts which can be configured to increase the y-axis on vertical bar charts. This can help to add some padding above the bars to improve the aesthetic of the chart.
21 May 2024
Secure Code Learning with SecDim
We're excited to be the first Pentest Management Platform to release a Secure Code Learning collaboration with SecDim - Dev-Native Attack & Defence Wargames.
With the power 💪 of SecDim and AttackForge, you can:
Explore a real vulnerability in a cloud native app. Debug and verify if your security patch can remediate the vulnerability
Train developers on how to fix vulnerabilities identified in their applications, during a pentest
Collaborate between engineers and security teams on how to best remediate vulnerabilities
Improve retesting pass rates for discovered vulnerabilities
Test your knowledge on how to fix common vulnerabilities and measure your effectiveness
Every Sandbox comes with a security test suite to simulate the exploitation of the vulnerability.
Sandboxes are integrated with git
so you can save your progress and pick it up again where you left off.
SecDim's catalogue is extensive, covering everything from AI, GraphQL, React, Kubernetes, to Web3. You can test your skills against modern security vulnerabilities inspired by real-world issues.
Each sandbox is deployed in a secure isolated Cloud Development Environment directly in your browser. You can debug, patch and test your code as if you were building an app.
Start by learning more about this integration, and when ready - switch the integration on.
Search SecDim's catalogue of vulnerable sandboxes which you can link to your Writeups.
When you create a vulnerability on a project, users will be able to see the linked SecDim sandboxes and launch a sandbox to get started.
Auto-Add Groups to Project Requests
You can now automatically assign Groups to Project Requests when they get created by group members.
This means any custom access controls you have created on the group will take effect immediately.
This makes it easy to have dedicated teams of people who can work together to view, edit and approve project requests - without the involvement of Administrators or Project Coordinators.
UX Improvements
Now when you open and close the Info panels on Vulnerabilities, Project Test Cases and Reporting - this action will be remembered for the duration of your session. This means you can easily switch between pages and see the information you want to see more easily and with less clicks.
We added new Core Fields for Hide Expressions to provide more flexibility when it comes to controlling your forms.
We also improved the behaviour of how CVSSv3.1 scoring is used on vulnerabilities, including better support for Nessus.
SSAPI Enhancements
We have made the following enhancements to the Self-Service APIs:
Get Assets In Library
now supports the Advanced Query filterCreate Vulnerability
andCreate Vulnerability With Library
now supports passing in Asset Library Ids.Update Vulnerability
andUpdate Vulnerability With Library
now supports updating the Affected Asset(s).Get Project Report Data
endpoint was created to allow programmatic creation of reports for selected vulnerabilities only.
ReportGen Improvements
We have improved ReportGen to make your reports even better!
$declare
,$push
and$assign
Functions now support 'this' and 'this[number]'$includes
now supports Dictionaries
3 May 2024
New Project Request Access Controls
You can now configure custom access controls on Project Requests.
This means you can now:
Create multi-stage review and approval workflows for Project Requests, particularly when combined with custom field access controls.
Delegate additional persons or group members to View, Edit or Action selective Project Requests.
Improve efficiency when it comes to project scoping workflows.
To get started, as an Administrator or Project Coordinator - access the Settings on the Project Request:
You can assign access to application user Roles, Groups or individual Users.
Each access control can be assigned with View, Edit or Action:
View means the user will be able to view the Project Request, but not make any changes.
Edit means the user will be able to view and edit the Project Request, and upload any supporting files.
Action means the user will be able to view and edit the Project Request, upload any files, request more information, and reject and approve the Project Request. Approving the Project Request will result in creation of a new Project.
When assigning Group access to the Project Request, the group members can be assigned with View, Edit and Action. This will apply to the Project Requests linked to the Group.
Project Coordinators and Administrators will continue to have access to all Project Requests, along with any additional Roles or Users who have been delegated global privileges to Action all Project Requests.
Vulnerability Imports Now Support Multiple Files
You can now import multiple scan files in one import. This means you can now take advantage of Grouped Assets on vulnerabilities across multiple scans - making it easier to identify and track unique vulnerabilities on the project, and associate affected assets more easily.
Simply select multiple scan files when prompted to select a file.
We also made improvements to user feedback during parsing of vulnerabilities.
Bulk Action Retest Vulnerabilities
We have now made it easier to see all vulnerabilities associated with a retest, and perform bulk actions.
Create Reports on Pending Vulnerabilities
You can now create reports on pending vulnerabilities. This makes it easier to review vulnerabilities in your custom reports, before releasing them to customers.
Filterable Project Team Details
You can now view the entire project team and filter on team members more easily:
Email Updates
Vulnerability-related events on projects, for example New Vulnerability Discovered email, now support {vulnerability.<tag>} Custom Email Meta Tags
Daily Start/Stop Testing Notifications on projects now support {project.<tag>} Custom Email Meta Tags
All emails which support the {link} tag now also support {link.url} which returns only the URL. This means you can use {link.url} inside custom buttons and achors in your emails.
Updates to ReportGen
We have added a new function $percentage that can be used to calculate the percentage of two values.
We also updated $keys to support $keys[this] which can be used to iterate on any object and return each key/value pair in the object as an array.
15 April 2024
Project Test Case custom fields
Project test cases now support custom fields.
This opens up many possibilities, for example:
Capturing Red-Team and Blue-Team information on Purple-Team assessments
Filtering on additional test case sub-status
Persisting additional testing details
You can also now re-order your project test case view to personalize how you want your test cases to appear on different projects.
Soon you will be able to use the Self-Service APIs to import custom project test cases for dynamic and reactive testing, for example importing scanner policies for scans performed.
Defining a Purple-Team project
Start by adding a custom field to your project which will be referenced by your test cases and vulnerabilities.
This will show purple-team fields on test cases and vulnerabilities for only purple-team projects, without creating additional overheads for other assessments.
Defining your Red-Team custom fields on Test Cases
Define your red-team project test case custom fields in Administration → Projects → Test Cases → Form
Create a Section for your red-team fields, this makes it easier to group your fields.
Add a Hide Expression to ensure your red-team section and its related fields only show on project test cases for purple-team projects.
Add Custom Field Access Controls to ensure that:
Red Teamers can View and Edit red-team fields;
Blue Teamers can only View red-team fields;
All others have no access to these fields.
Defining your Blue-Team custom fields on Test Cases
Define your blue-team project test case custom fields in Administration → Projects → Test Cases → Form
Create a Section for your blue-team fields, this makes it easier to group your fields.
Add a Hide Expression to ensure your blue-team section and its related fields only show on project test cases for purple-team projects.
Add Custom Field Access Controls to ensure that:
Blue Teamers can View and Edit blue-team fields;
Red Teamers can only View blue-team fields;
All others have no access to these fields.
Defining your Red-Team custom fields on Vulnerabilities
Define your red-team vulnerability custom fields in Administration → Projects → Vulnerabilities → Form
Create a Section for your red-team fields, this makes it easier to group your fields.
Add a Hide Expression to ensure your red-team section and its related fields only show on vulnerabilities for purple-team projects.
Set your project as a Purple-Team project
When creating or editing a project, select Purple Team
from the Testing Types custom field.
Complete Purple-Team project test case fields on purple-team projects
When working on a purple team assessment, you can now complete the purple-team fields on the project test cases.
Complete Purple-Team vulnerability fields on purple-team projects
When working on a purple team assessment, you can now complete the purple-team fields on the vulnerabilities.
Configuring sub-status on project test cases
Defining a sub-status on project test cases
Start by adding a custom field to your project test cases which will be used to capture the sub-status of a test case.
Track and manage sub-status on project test cases
When working on a project, you can now complete the relevant sub-status on project test cases.
You can also filter and sort your project test cases on sub-status.
Capturing additional information on project test cases
Defining additional information on project test cases
Start by adding custom fields to your project test cases which will be used to capture additional information relevant for your test cases.
Entering additional information on project test cases
When working on a project, you can now complete the relevant fields when working on project test cases.
New time-based custom email options
You can now configure custom time-based emails for Projects, Project Requests and Users - in addition to previously supported Vulnerabilities.
Some examples of custom time-based emails could include:
Notify vulnerability owners when vulnerabilities are 7-days from breaching SLAs
Notify remediation teams when vulnerabilities are 10-days from reaching Target Remediation Date
Notify security teams when vulnerabilities exceed SLAs
Notify project teams when projects have overrun
Notify project coordinators when project requests have not been actioned for some time
Notify users when their account will be locked out due to inactivity
Check Custom Time-Based Emails for more details.
Import vulnerabilities via JSON file
You can now import vulnerabilities directly from a JSON file.
This makes it easy to import vulnerabilities from any source, where the data can be formatted into JSON format.
A template is provided to help make this process easy, as well as details for required fields.
Rich-text custom fields now support images
The following rich-text custom fields now support display of images in-app and in-reports:
Project Requests
Vulnerabilities
Writeups
Project Test Cases
Test Suite Test Cases
Config change detection
Changes to configuration will now trigger all users to reload their app to retrieve the new configuration, at a time suitable for the user.
Custom field dates now support time picker
You can now enable capturing and display of time for your Datepicker custom fields.
This can be useful if you need to capture time, for example Execution Start Time and Execution End Time for Red-Team activities or for captured logs.
This option can be configured using the Display Time
option configured on the the Datepicker custom field.
Project Request information now available in reports
You can now add information from your linked Project Request into your reports.
First, start by enabling this option in Administration → Projects → Export Project as JSON → Project Request
Now in your reports, you can access the Project Request information using {projectRequest}
for example:
Vulnerability imports now support Qualys Guard
You can now import vulnerabilities from Qualys Guard.
Reports now support email addresses for project team
You can now include email addresses for your project team members in your reports.
Start by enabling this option in Administration → Projects → Export Project as JSON → Team Member Email
You can print the emails of the team members in your report as follows:
ReportGen - $help now supports [scope] and [var]
You can now use {$help[scope]}
and {$help[var]}
in your report templates to show debugging and help information in your ReportGen browser console.
31 January 2024
Asset Libraries
You can now use Asset Libraries to manage your assets better!
Asset libraries will help you to:
Group and manage assets across different teams, technologies, products, customers, business units, networks or compliance;
Control who can see assets, and which assets they can see;
Manage who can create and modify assets;
Assign assets to many groups for better tracking and de-duplication;
You can view your asset libraries directly from the Assets module:
Take advantage of libraries when adding scope to a project:
Control which libraries get used when importing vulnerabilities:
Assign libraries when importing assets:
Asset libraries can be configured from the Administration module.
Assets can belong to one or more libraries, allowing to share access or ownership of assets and reducing asset duplication.
Assets are unique to each library.
Asset libraries can have access controls to manage who can view or edit the assets.
Access controls can be applied to:
Application Roles
Groups
Users
Access to libraries can be assigned with either View or Edit privileges.
Users with View access to an asset library will be able to see the asset and any vulnerabilities for which that user has access to via their projects.
Users with Edit access to an asset library will be able to create assets in that library; and make changes to any asset in that library, including ability to archive the asset or link additional asset libraries.
Bulk actions can be used to bulk (re)assign assets to libraries.
You can now also import assets from CSV and JSON formats – making it even easier to bring existing assets into AttackForge!
For more details, please visit https://support.attackforge.com/attackforge-enterprise/modules/assets
Portfolios Enhancements
You can now provide access to Portfolios and Streams for:
Your customers;
Your engineering teams and product owners;
Your security, risk and compliance teams;
Your business management and senior leadership;
Your external auditors and 3rd parties;
This makes it possible to have custom dashboards which are relevant and tailored to your stakeholders, which they can now access.
Access can be granted to the entire Portfolio, or individuals Streams. This enforces need-to-know.
Users will only see project, vulnerability and asset related data which is relevant to their existing projects.
Users will not be able to see project, vulnerability and asset data for which they do not already have access.
We have also enriched the data available for projects, vulnerabilities and assets.
Users can also configure their own table preferences to consume the data the way they prefer.
ReportGen v2.9
We have just released another massive update for AttackForge ReportGen: The ultimate pentest reporting tool!
This release includes three (3) new functions; one (1) new style; and access to user profile data in reports!
New Function: $hyperlink
You can use this new function to construct hyperlinks in your reports.
Hyperlinks can be built using data from your project (scope), manual creation or based on values from other variables.
For more information on how to use this function, visit this link.
New Style: hyperlink_style
This release introduces support for hyperlinks for rich-text fields. We have also released a new style which allows you to independently set the style for hyperlinks contained within the styled tags. You can apply this style to any of the {@..._styled} fields.
For more information on how to use this style, visit this link.
New Function: $comment
You can use this new function to include comments in your template which do not get shown in the report.
This can be useful to help with adding explanations and also debugging.
For more information on how to use this function, visit this link.
New Function: $multiply
You can use this new function to multiply a variable which has a numeric value.
For more information on how to use this function, visit this link.
User Profiles Now Available
You can now include user profile information in your reports for each team member on the project.
For examples how to include this information in your reports, visit this link.
Updated Testing Methodologies and Vulnerability Libraries
We have updated to the latest version of MITRE ATT&CK framework, which you can now easily import into your Test Suites.
MITRE ATT&CK Enterprise Version 14.1
MITRE ATT&CK Mobile Version 14.1
MITRE ATT&CK ICS Version 14.1
To get started, head over to https://github.com/AttackForge/TestSuites
Download the relevant methodologies and follow the guide to import them into your Test Suites.
We have also updated to the latest version of MITRE CWE and MITRE CAPEC, which you can now easily import into your Writeups.
MITRE CWE Version 4.13
MITRE CAPEC Version 3.9
To get started, head over to https://github.com/AttackForge/Writeups
Download the relevant vulnerability libraries and follow the guide to import them into your Writeups.
Report Locking
You can now control when reports are available for download on any given project.
This is particularly useful if you want to restrict your customers from generating reports until a point in time on the project, for example when testing is completed or when QA has finished.
When creating or updating a project, you can now configure the minimum Access Level required on the project in order to generate reports.
Custom Project Roles
You can now configure custom project roles which can be assigned to any project team member.
This is particularly useful if you want to create roles which align with your internal operating processes.
These roles can be reflected in emails, reports and in automations and integrations.
These roles are not used for access control.
You can manage the project roles from Administration -> Projects -> Fields -> Team Members.
Custom System Email Notifications
You can now configure and personalize every system email!
You can independently for each system email notification:
Enable or Disable the email notification;
Configure a custom Subject with HTML and {metatags} support
Configure a custom Body with HTML and {metatags} support
You can manage the email notifications from Administration -> Notifications.
For a full list of {metatags} supported – please visit this link.
Custom Report Names
You can now configure the custom report name for all of your downloaded reports.
This configuration option also supports (metatags}.
You can update your report name from Administration -> Reporting -> Report Name.
Manage User Roles via SSO Groups
For SSO users – you can now opt into managing application user roles via SSO groups.
This ensures that every time an SSO user logs in, their application user role will be automatically updated to match their expected role via the mappings.
This makes it easier for AttackForge Administrators managing tenants with hundreds or thousands of users.
It also helps to comply with internal policies for privileged access management.
You can opt into this setting from Administration -> Users -> Manage Application User Roles via SSO Groups.
UX Enhancements
Inline vulnerability view on tables
When viewing vulnerabilities in a table, you can now preview the vulnerability without having to navigate away.
To do so, click on the eye icon next to the vulnerability name.
Retest rounds now should on schedules
Retest rounds now have an optional end date and will now also show on your global and project schedules.
Rich-text fields now support hyperlinks
Rich-text fields now support option to include hyperlinks. These hyperlinks will also automatically show in reports for any ‘_styled’ fields.
Warnings to help prevent data loss
We have added warnings when you have data entered into a form and try navigating away, or when you try to close a popup window with data.
This UX improvement will help to prevent any accidental data loss on common user actions.
Wider, taller and draggable form fields
We have reviewed all forms within AttackForge and where needed we have made fields wider and taller.
We have also enabled ability for rich-text fields to have draggable adjustable height.
Set custom error message for blocked accounts
You can now configure a custom error message for blocked accounts.
This is useful if you have company-specific instructions on account reactivation process that you want to show blocked users.
Bulk add tags on grouped assets
You can now bulk add tags to grouped assets when working on vulnerabilities.
Bulk overwrite on vulnerabilities now supports mixed asset selections
You can now perform bulk overwrite actions on vulnerability selections with mixed asset types i.e. individual or grouped assets.
Hovering on project name shows full name
We made adjustments to show more information when hovering on data, including on the project name.
Linking Vulnerabilities to Test Cases
You can now link vulnerabilities to test cases directly from the test cases.
This makes is easier to fail test cases in bulk, and to show direct correlation between testing and findings.
Importing Vulnerabilities
We added support for Nuclei Scanner and Acunetix 360 when importing vulnerabilities on a project.
Updates to Self-Service API
We made updates to the Invite User To Project and Invite Users To Project Team RESTful API endpoints to include additional fields.
We also added support for Asset Libraries for all of the relevant RESTful APIs.
Video Tutorials
Introduction to AttackForge and On-Demand Trial Environments
We recently released a new trial service for AttackForge – https://try.attackforge.io – which allows people to deploy a dedicated, on-demand private tenant of AttackForge with just their email address. The entire process takes less than two minutes from signup to deployment!
We created a short video to demonstrate this process for deploying new trial environments, as well as a brief introduction to AttackForge.
This video might be useful to you if:
You need access to on-demand non-production AttackForge tenants for testing configuration, integrations or scripts;
You want to access the newest features in an environment that is already configured with optimal settings for the latest features;
You want your customers or users to get a preview for what the AttackForge application is about and key workflows, prior to interacting with your own AttackForge.
The video is available on YouTube:
Pentest Report Automation with AttackForge
We created a short video to demonstrate how to set up an automation for PDF report generation and delivery to customers.
This video might be useful to you if:
You need to send encrypted PDF reports to your customers via email and programmatically;
You are interested in exploring automations in AttackForge;
You are interested in how custom fields can be used to enforce custom workflows.
The video is available on YouTube:
Red Teaming with AttackForge
We created a short video to demonstrate how to do Red Teaming in AttackForge.
This video might be useful to you if:
You are considering starting to perform Red Team assessments in AttackForge;
You are already performing Red Teaming in AttackForge.
The video is available on YouTube:
Last updated