Platform · External Penetration Testing

Attack your perimeter
before adversaries do.

BreachBrain's platform runs automated external penetration testing against your internet-facing systems — going beyond scanning to actively attempt exploitation, and delivering analyst-verified findings you can act on immediately.

External

testing requires no agent, no VPN, and no access to your internal network — just your target scope.

Active

exploitation attempts — not just a list of open ports. BreachBrain tests whether vulnerabilities are actually exploitable.

Analyst

reviews every finding before the report is released — validating severity, removing false positives, signing off.

Scanning vs. Penetration Testing

A scanner finds the door. A pentest tries to open it.

Vulnerability scanners report what's present. External penetration testing goes further — actively attempting to exploit detected weaknesses to determine whether they represent a real, exploitable breach path.

BreachBrain's platform runs these tests automatically against your internet-facing systems. No consultant scheduling. No waiting weeks. Findings are prioritized by actual exploitability, not theoretical severity.

See how it works ›
What Gets Tested

Your internet-facing attack surface, end to end.

Network Services & Open Ports

Identification and exploitation testing of internet-exposed services — including administrative interfaces, legacy protocols, and services that should not be publicly accessible.

Web Applications

Testing of public-facing web applications for common vulnerability classes — injection flaws, authentication weaknesses, misconfigured access controls, and information disclosure.

SSL/TLS & Cryptography

Weak cipher suites, outdated protocol versions, and certificate misconfigurations that expose encrypted traffic to interception or downgrade attacks.

Email Security

SPF, DKIM, and DMARC validation combined with active testing for mail server vulnerabilities and spoofing vectors that enable phishing and business email compromise.

Known CVE Exploitation

Detected software versions are matched against known CVEs and tested for exploitability — confirming which vulnerabilities represent actual risk, not just theoretical exposure.

Misconfiguration Discovery

Cloud storage exposures, default credentials, directory listings, backup files, and other configuration issues that attackers exploit before any vulnerability scanner flags them.

What You Receive

Findings ranked by what's actually exploitable.

Prioritized Findings

Every issue classified Critical, High, Medium, or Low — ranked by exploitability and potential impact, not just CVSS score. Fix what matters most first.

Proof-of-Concept Detail

For exploitable vulnerabilities, findings include the evidence and context needed to understand the real-world impact — not just a CVE number.

Remediation Guidance

Plain-language remediation steps for every finding — actionable by your IT team or vendor without requiring a security consultant to interpret.

Analyst-Signed PDF Report

Every report is reviewed and approved by a certified cybersecurity analyst before delivery. Accepted for cyber insurance applications, compliance audits, and vendor risk reviews.

Email Alerts on Critical Findings

Critical and High findings trigger immediate email alerts — so your team can respond before the full report is finalized.

Executive Summary

A board- and insurer-ready summary of your external exposure — risk level, top findings, and posture overview in plain language.

Full Test Catalog

65 checks across 7 categories.

Every external penetration test runs the full catalog automatically. Expand any category to see exactly what gets tested and why it matters.

A Discovery & Enumeration 8 checks

Website Crawl

Recursively spiders all reachable pages, forms, and linked resources on the target domain. Builds a complete map of exposed attack surface — every scan starts here.

Subdomain Enumeration

Discovers subdomains via DNS brute-force, certificate transparency logs, and passive sources. Shadow IT and forgotten subdomains are a leading entry point for attackers.

Technology Fingerprinting

Identifies web frameworks, CMS platforms, server software, and JavaScript libraries. Knowing your stack lets us match known vulnerabilities to exactly what you're running.

WAF / CDN Detection

Detects the presence and type of web application firewall or CDN in front of the application. Confirms your perimeter defenses are active and helps prioritize bypass-risk findings.

Cloud Storage Exposure

Detects publicly accessible S3 buckets, Azure Blob containers, and GCS buckets linked to the domain. Misconfigured cloud storage leaks sensitive files to anyone with a browser.

Open Port / Service Exposure

Identifies unexpected services exposed on non-standard ports for the web-facing IPs. Every open port is an attack surface — web servers should expose 80/443 only.

Admin Panel Discovery

Probes common paths for admin consoles, management interfaces, and control panels. Exposed admin panels are high-value targets for credential stuffing and brute-force.

Backup & Source File Detection

Looks for .bak, .zip, .sql, .git, .env, and similar files in common locations. Source code and database dumps left on the server hand attackers your entire application.

B Passive Security Checks 16 checks

HTTPS Enforcement

Verifies that all HTTP traffic is redirected to HTTPS and that TLS is properly configured. Unencrypted traffic can be intercepted and modified in transit.

HSTS (HTTP Strict Transport Security)

Checks that the Strict-Transport-Security header is present with a sufficient max-age. Without HSTS, browsers can be downgraded to HTTP by a network attacker.

TLS Certificate Validity

Validates certificate chain, expiry date, issuer trust, and domain match. Expired or misconfigured certs trigger browser warnings and can break encryption guarantees.

TLS Protocol & Cipher Strength

Detects support for deprecated protocols (SSLv3, TLS 1.0/1.1) and weak cipher suites. Weak TLS can be exploited to decrypt traffic or forge certificates.

Content Security Policy (CSP)

Evaluates the Content-Security-Policy header for completeness and bypass-prone directives. A strong CSP is the primary browser-side defense against cross-site scripting.

Clickjacking Protection

Checks for X-Frame-Options or frame-ancestors CSP directive. Without it, attackers can embed your site in an invisible iframe to trick users into unintended actions.

Secure Cookie Attributes

Verifies session and auth cookies carry Secure, HttpOnly, and SameSite flags. Missing flags allow cookies to be stolen via XSS or sent in cross-origin requests.

Sensitive File Exposure

Tests for accessible robots.txt leaks, .htaccess, web.config, phpinfo(), and error pages with stack traces. These files hand attackers a roadmap of your application's structure and secrets.

Referrer Policy

Checks the Referrer-Policy header to prevent sensitive URL data leaking to third parties. URLs containing tokens, IDs, or search terms can be harvested from referrer headers.

Permissions Policy

Validates the Permissions-Policy header to restrict access to browser APIs (camera, mic, geolocation). Overly permissive policies allow malicious scripts to access sensitive device features.

Cross-Origin Isolation (COEP/COOP)

Checks Cross-Origin-Embedder-Policy and Cross-Origin-Opener-Policy headers. Required to protect against Spectre-class side-channel attacks in modern browsers.

DNS Security (DNSSEC)

Verifies whether DNSSEC is enabled for the target domain. Without DNSSEC, DNS responses can be spoofed, redirecting users to attacker-controlled servers.

Email Security (SPF / DKIM / DMARC)

Checks DNS records for email authentication policies. Missing or weak email security enables phishing attacks that impersonate your domain.

Subdomain Takeover Risk

Identifies DNS records pointing to deprovisioned cloud or SaaS services. Dangling DNS entries allow attackers to claim your subdomain and serve malicious content.

C API Security 9 checks

GraphQL Introspection Enabled

Checks whether the GraphQL schema can be fully queried by unauthenticated clients. Introspection exposes your entire API contract to attackers, making targeted exploitation trivial.

GraphQL Query Depth Limiting

Tests whether deeply nested queries are rejected before executing. Unbounded query depth enables "GraphQL bombs" that exhaust server resources in seconds.

GraphQL Batching Abuse

Sends batched query arrays to detect whether rate limiting and auth are enforced per-operation. Batching bypasses rate limits, enabling credential stuffing and enumeration at scale.

REST API Data Overexposure

Inspects API responses for fields that should not be returned to the client (internal IDs, hashes, PII). Overly verbose API responses leak data that attackers can chain into further attacks.

PII in API Responses

Scans API responses for patterns matching emails, phone numbers, SSNs, and payment data. Regulatory frameworks (GDPR, HIPAA, PCI-DSS) impose heavy penalties for PII leakage.

BOLA / IDOR via API

Tests object-level authorization by substituting IDs in API endpoints to access other users' resources. Broken object-level authorization is the #1 API vulnerability per the OWASP API Top 10.

Mass Assignment

Sends requests with extra body fields to test whether the API accepts unauthorized property updates. Attackers can elevate privileges or modify protected fields by adding unexpected parameters.

API Authentication Enforcement

Verifies that API endpoints return 401/403 when accessed without valid credentials. Unauthenticated API access is an immediate, high-severity finding.

API Rate Limiting

Tests whether endpoints enforce request throttling to prevent automated abuse. Without rate limiting, your API is open to credential stuffing, enumeration, and denial of service.

D Authorization & Access Control 6 checks

IDOR via Query Parameters

Detects numeric/sequential IDs in query strings and tests cross-user access. Sequential IDs combined with missing access checks expose every user's data.

IDOR via URL Path

Detects resource identifiers embedded in URL paths and tests authorization enforcement. Path-based IDORs are common in REST APIs and often overlooked during code review.

Forced Browsing

Attempts to access authenticated pages and functions without a valid session. Authentication bypasses allow full account takeover without any credentials.

Privilege Escalation (Horizontal)

Tests whether a standard user can access resources belonging to another user of the same role. Horizontal privilege escalation is the most common real-world breach pattern in web apps.

Privilege Escalation (Vertical)

Tests whether a standard user can access admin-only functionality. Vertical escalation gives attackers full control of the application.

Directory Listing

Checks whether web server directory listing is enabled, exposing file trees. File tree exposure allows attackers to enumerate and download application assets directly.

E Active Vulnerability Testing 12 checks

Reflected Cross-Site Scripting (XSS)

Injects payloads into URL parameters, form fields, and headers to test for unsanitized reflection. XSS enables session hijacking, credential theft, and malicious redirects targeting your users.

Stored XSS

Tests input fields that persist data (comments, profiles, messages) for stored script injection. Stored XSS is higher severity — one injection can attack every user who views the content.

DOM-Based XSS

Analyzes client-side JavaScript for unsafe DOM manipulation patterns. DOM XSS is invisible to server-side scanners and commonly missed in manual reviews.

SQL Injection (Time-Based)

Injects time-delay payloads into parameters to detect blind SQL injection without triggering errors. Time-based SQLi detects database vulnerabilities that produce no visible error output.

SQL Injection (Error-Based)

Injects payloads designed to trigger database error messages that confirm injectable parameters. Error-based SQLi provides attackers with database structure details to accelerate exploitation.

Server-Side Request Forgery (SSRF)

Tests URL input fields and webhooks for the ability to make the server issue internal network requests. SSRF can reach internal metadata APIs, internal databases, and AWS/GCP instance credentials.

Open Redirect

Tests redirect and next parameters for unvalidated URL forwarding. Open redirects are weaponized in phishing campaigns to borrow the trust of your domain.

Command Injection

Injects OS command separators into input fields that may pass data to shell functions. Remote code execution via command injection gives attackers full server control.

Path Traversal

Tests file path parameters with ../ sequences to reach files outside the web root. Path traversal can expose /etc/passwd, application config files, and private keys.

XML External Entity (XXE)

Sends crafted XML payloads to endpoints that parse XML, testing for entity injection. XXE can read local files, probe internal network services, and cause denial of service.

Server-Side Template Injection (SSTI)

Injects template syntax into input fields to detect unsafe template evaluation. SSTI typically leads directly to remote code execution on the web server.

Insecure Deserialization

Tests serialized object inputs for gadget-chain payloads that trigger code execution. Deserialization vulnerabilities are a direct path to RCE and are difficult to detect manually.

F Dependency & CVE Detection 4 checks

JavaScript Library CVE Matching

Identifies client-side JS library versions from responses and matches against the CVE database. Outdated jQuery, React, Angular, and other libraries carry exploitable known vulnerabilities.

Server Software CVE Matching

Fingerprints web server, CMS, and framework versions and checks for associated CVEs. Unpatched server software is the most common root cause of mass exploitation events.

CMS Plugin Vulnerability Detection

Identifies WordPress, Drupal, Joomla, and other CMS plugin versions and flags known-vulnerable versions. CMS plugin vulnerabilities account for the majority of successful website compromises.

Dependency Confusion Risk

Detects public package names that mirror private internal package names. Dependency confusion allows attackers to inject malicious code into your build pipeline.

G Asset Change Detection 7 checks

New Endpoint Detection

Flags URLs and endpoints discovered in the current scan that were not present in the prior scan. New endpoints may be unintentionally exposed features, staging deployments, or shadow services.

Removed Endpoint Detection

Flags URLs present in the previous scan but missing in the current one. Unexpectedly removed pages may indicate a breach response or configuration error.

New Subdomain Detection

Identifies subdomains present in the current scan but absent from the prior scan. New subdomains may indicate shadow IT, unauthorized deployments, or supply chain additions.

Technology Stack Changes

Flags new frameworks, libraries, or server software detected since the last scan. Unexpected technology changes may indicate a supply chain compromise or unauthorized modification.

New Open Port / Service

Detects services exposed in the current scan that were not present previously. Newly exposed services are high-priority targets — they may be unintentionally published.

SSL Certificate Change

Detects certificate reissuance, issuer changes, or new domains on the certificate. Certificate changes can indicate a man-in-the-middle setup or domain reassignment.

DNS Record Changes

Compares MX, A, CNAME, and TXT records against the previous scan baseline. DNS changes can indicate domain hijacking, subdomain takeover, or unauthorized redirects.

Know whether your perimeter can actually be breached.

Start your free 7-day trial — no charge until day 8.