6-Phase Methodology

How Find The Breach Works

Our comprehensive 6-phase methodology ensures no vulnerability goes undetected.

The 6 Phases

1

Scope Definition

Define targets, scan type, and tool configuration. Choose from quick, full, recon, web-only, port-only, or pentest profiles to tailor the engagement to your exact needs.

2

Reconnaissance

Passive and active intelligence gathering: DNS enumeration, subdomain discovery, technology fingerprinting, WHOIS, and certificate transparency logs.

Amass Subfinder crt.sh WhatWeb HTTPX
3

Vulnerability Scanning

Automated scanning with 40 tools: port scanning, web vulnerability detection, SSL/TLS analysis, and directory brute-forcing.

Nmap Nuclei OWASP ZAP Nikto TestSSL Feroxbuster Dirsearch
4

Active Testing

SQL injection, XSS, CSRF, authentication testing, brute force, and command injection probes against identified attack surfaces.

SQLMap Hydra Wapiti Commix XSS Scanner
5

AI-Powered Analysis

AI assistant analyzes findings, correlates vulnerabilities, assigns accurate severity ratings, and maps results to compliance frameworks — OWASP, PCI, HIPAA, SOC2.

6

Reporting & Remediation

Three report formats: Executive PDF for stakeholders, Interactive Web Report for drill-down analysis, and Copilot Fix File with copy-paste code fixes.

Scan Profiles

Choose the profile that matches your security objective. Each profile activates a curated set of tools.

Profile Tools Used Duration Best For
Quick Nmap, Nuclei, HTTPX, TestSSL 5–15 min Fast health check & top-level exposure
Full All 40 tools (every phase) 45–90 min Comprehensive security audit
Recon Amass, Subfinder, crt.sh, WhatWeb, HTTPX, Shodan 10–25 min Attack surface discovery & asset inventory
Ports Only Nmap, Masscan, Banner Grabbing 5–20 min Network perimeter & open-port analysis
Web Only Nuclei, ZAP, Nikto, Feroxbuster, Dirsearch, Wapiti 20–40 min Web application vulnerability testing
Pentest Full + SQLMap, Hydra, Commix, XSS Scanner 60–120 min Full penetration test with active exploitation

Tool Arsenal

40 industry-standard tools orchestrated into a single automated pipeline.

Reconnaissance

Amass

In-depth DNS enumeration & subdomain mapping

Subfinder

Fast passive subdomain discovery

crt.sh

Certificate transparency log search

WhatWeb

Technology fingerprinting & CMS detection

HTTPX

HTTP probing, status codes & tech detection

Shodan

Internet-wide asset & exposure intelligence

WHOIS

Domain ownership & registration lookup

Web Scanning

Nuclei

Template-based vuln scanner with 8,000+ checks

OWASP ZAP

Full web app security scanner & proxy

Nikto

Web server misconfig & outdated software check

Feroxbuster

Recursive content & directory brute-forcing

Dirsearch

Path discovery & hidden endpoint enumeration

Wapiti

Black-box web application vulnerability scanner

TestSSL

SSL/TLS cipher & certificate analysis

SSL Labs API

Grade-based TLS configuration assessment

Network

Nmap

Port scanning, OS detection & service enumeration

Masscan

High-speed port scanning at internet scale

Banner Grabbing

Service version & protocol identification

DNS Recon

DNS zone transfer & record enumeration

Traceroute

Network path & hop analysis

Active Testing

SQLMap

Automated SQL injection detection & exploitation

Hydra

Multi-protocol brute force authentication testing

Commix

OS command injection detection & exploitation

XSS Scanner

Cross-site scripting payload testing & validation

CSRF Tester

Cross-site request forgery detection

AI & Cloud

AI Copilot Engine

LLM-powered analysis, correlation & fix generation

ScoutSuite

Multi-cloud security auditing (AWS, Azure, GCP)

Prowler

AWS security best-practice compliance checks

CloudSploit

Cloud infrastructure misconfiguration detection

Compliance Mapping

Every finding is automatically mapped to the frameworks your organization cares about.

OWASP Top 10

Findings tagged to A01–A10 categories with severity alignment and remediation guidance.

PCI DSS

Mapped to PCI requirements (Req 6, 11) for cardholder data environment assessments.

HIPAA

Technical safeguard alignment for ePHI systems — access control, encryption & audit.

SOC 2

Trust service criteria mapping: security, availability, confidentiality & processing integrity.

GDPR

Data protection impact analysis — Article 32 technical measures & breach risk scoring.

Custom Frameworks

Define your own compliance mapping with custom tags, categories & severity overrides.

Ready to Find Your Breaches?

Launch your first scan in minutes. No agents to install, no infrastructure to manage.