How AttackVector Works
A multi-stage, non-destructive security assessment that identifies vulnerabilities, models attack paths, and maps compliance gaps — all without exploitation.
Free Tier
Passive reconnaissance and basic security checks
Stage 1: Reconnaissance
Endpoint discovery, link crawling, robots.txt analysis, and sitemap extraction.
Stage 2: Fingerprinting
Technology stack detection including web server, framework, and JavaScript library identification with version extraction.
Basic Vulnerability Scan
SSL/TLS certificate validation, HTTP security headers audit, CVE matching, and AI-generated security grade (A-F). Top 3 vulnerabilities shown.
Pro Tier$79/mo
Active scanning with Stage 3 exploit validation
Everything in Free, plus verified scope active scanning and 8 detect-only exploit validation modules:
SQL Injection Detection
Boolean/time-based detection only — no data extraction
Reflected XSS Detection
Harmless marker reflection check in response and DOM
Auth Misconfiguration
Checks for unprotected sensitive endpoints
IDOR Detection
Minimal ID variation with structure comparison
CVE Fingerprint Confirmation
Version-to-CVE correlation from local database
Object Storage Exposure
Permission probes on cloud storage buckets
Admin Panel Detection
Signature-based discovery of admin interfaces
TLS Misconfiguration
Handshake analysis for weak ciphers and protocols
Premium Tier$199/mo
Full Stage 4 attack path modeling and compliance mapping
Attack Path Modeling
In-memory attack graph construction with BFS/DFS path ranking. Identifies the top attack chains from internet attacker to high-impact assets with step-by-step remediation priorities.
Compliance Mapping
Maps every finding to NIS2 (gap indicator only), ISO 27001 Annex A, SOC 2 Common Criteria, and NIST CSF with 1-2 line rationale per mapping.
Executive Reporting
AI-generated business risk summary with top risks, likely entry points, worst-case outcomes, and quick wins. Executive PDF export for leadership.
Remediation Roadmap
Prioritized remediation plan based on attack path analysis, severity, and business criticality. Template-based, deterministic output.
What We Do and What We Do Not Do
What We Do
- ✓Non-destructive vulnerability detection
- ✓Passive reconnaissance and fingerprinting
- ✓Detect-only exploit validation (no data extraction)
- ✓Attack path modeling based on observed findings
- ✓Compliance gap indicators (NIS2, ISO 27001, SOC 2, NIST)
- ✓Structured, reproducible JSON outputs
- ✓Full audit trail of all scan operations
What We Do NOT Do
- ✗No remote code execution or shell access
- ✗No data extraction, dumping, or exfiltration
- ✗No privilege escalation attempts
- ✗No brute force or credential stuffing
- ✗No denial of service (DoS) attacks
- ✗No scanning outside verified scope
- ✗No compliance certification (gap indicators only)
Authorization Required: You must have explicit authorization to scan any target. AttackVector enforces strict scope verification. Scanning without authorization may violate applicable laws.
Asset Ownership Verification
Before any active scanning begins, you must prove ownership of the target asset. This is a mandatory step — AttackVector will never scan assets without verified authorization.
DNS TXT Challenge
DomainsAdd a TXT record to your domain's DNS to prove ownership.
DNS TXT Record
_attackvector.yourdomain.com TXT "av-verify=<token>"Reverse HTTP Challenge
IP AddressesHost a verification file on the target server so we can confirm you control it.
Host this file
http://<IP>/.well-known/attackvector.txtSigned Outbound Callback
IP AddressesRun a signed curl command from the target server to confirm you have shell access to it.
Run on target
curl https://attackvector.tech/verify/<token>Lightweight Agent
IP AddressesDeploy a minimal agent on the target that handles verification and provides a secure communication channel for deeper assessments.
One-line install
curl -sSL https://attackvector.tech/agent | sh -s <token>Ready to Assess Your Security?
Start with a free scan or upgrade to Pro for full exploit validation.