Welcome to Ghost App Recon, the first step in gaining visibility into your applications and APIs. Ghost App Recon is designed to help Application Security (AppSec) analysts discover the external-facing applications and API endpoints they are responsible for protecting. While identifying vulnerabilities is a key benefit, the primary goal is mapping your attack surface and ensuring security best practices and hygiene across your environment.
This guide will walk you through how Ghost App Recon works, how to use it, and what to do next in your security journey with Ghost.
Getting Started
Step 1: Activate Your Ghost Account
When your organization signs up for Ghost, we automatically provision your tenant on our SaaS platform.
You’ll receive an account activation email—click the link inside to set up your password and log in.
Step 2: Enter Your Top-Level Domain (TLD)
Once logged in, Ghost will prompt you to enter your organization’s top-level domain (TLD) (e.g.,
example.com
).Simply enter the domain and hit Run Ghost App Recon.
That’s it—no additional setup required! Ghost will begin scanning immediately.
Step 3: Wait for Discovery to Complete
Typical scan time: 5 minutes (may take up to 20 minutes for larger domains).
Progress updates: The Ghost UI will indicate that scanning is in progress. Some results will begin loading before the scan fully completes.
Once the first set of results are in, you’ll see a popup congratulating you on completing your first step in securing your apps! 🎉
How Ghost App Recon Works
Once you provide a TLD, Ghost App Recon automatically:
Finds subdomains using combination of proprietary and open-source reconnaissance tools.
Probes each discovered subdomain to identify live hosts.
Identifies hosts serving web applications by checking HTTP responses.
Runs a headless browser to visit the root of each web application.
Extracts metadata from each application, including:
API Endpoints (host, path, method, port).
Host details (certificate info, issuer, provider, IP addresses, DNS records, CNAMEs).
Scripts and front-end assets (used to evaluate security hygiene).
Feeds all collected data into the Ghost platform, where our Issue Rules Engine analyzes findings for security misconfigurations and best practices.
Note: The headless browser does not crawl sites, click links, fill forms, or interact with applications beyond loading the application root.
What Ghost App Recon Detects
Ghost App Recon evaluates applications, hosts, APIs, and scripts for potential security issues, including:
Misconfigured or invalid certificates
Misconfigured CORS policies
Potential XSS risks in front-end scripts
Leaked secrets in JavaScript
Unhandled errors in the browser console
Other security hygiene best practices
and more!
Ghost does not currently perform authenticated scans or access internal/private domains—these capabilities are planned for future releases.
Accessing Your Recon Data
Where Does the Data Go?
Your discovery results are immediately available in the Ghost UI and API.
UI Dashboard: View discovered apps, APIs, hosts, and security findings.
API Access: Query data programmatically for integration with security workflows.
How Risks Are Categorized
Ghost App Recon classifies findings by severity and provides remediation guidance for security issues.
Configuring Ghost App Recon
Managing Domains
Ghost App Recon scans run once per day for all enabled TLDs.
You can disable scans for any TLD at any time from the Setting > Domains page.
Ghost will also suggest other TLDs discovered during scanning—enabling scans for all your organization’s TLDs ensures the best visibility.
Enable Ghost App Recon for more domains from the Settings > Domains page.
Understanding Scan Traffic
Ghost App Recon scans originate from Google Cloud Platform (GCP). Customers can reference GCP’s IP blocks to identify scan traffic.
Ghost includes custom User-Agent strings in all requests so customers can easily identify traffic from our platform. You may observe one or both of the following User-Agent string patterns:
User-Agent: ghost-discovery/<release-hash>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36 ghost-profiler/<release-hash>
Note that ghost-discovery
and ghost-profiler
are fixed identifiers. The remaining string values and release hash values may change.
What’s Next?
Once external discovery is complete, continue your security journey with Ghost by:
1. Connecting to Source Code
Connect your SCM organization to map your source code repositories to runtime applications and APIs.
2. Ingesting SAST Findings
Ghost enriches, validates, and prioritizes static analysis security testing (SAST) findings.
Gain code-to-runtime context and actionable risk analysis.
3. Deploying Log Forwarders
Help Ghost build a complete API inventory by forwarding logs from your environment.
Support & Feedback
If you encounter issues or have feedback:
Use the in-product feedback mechanism to report problems.
Email any Ghost point of contact for support.
Final Thoughts
Ghost App Recon is your first step toward complete application security visibility. By enabling Ghost to continuously discover your apps and APIs, you’ll stay ahead of misconfigurations, security gaps, and attack surface changes.
Ready to dive in? Log in now and start securing your applications! 🚀