Agentless & Passive Recon
mDNS, ARP, header analysis, traffic fingerprints — quickly map local networks without endpoints.
Platform Capabilities
Pentesterra combines vulnerability management, attack surface mapping, breach simulation, and controlled exploitation into one continuous workflow with evidence-first prioritization.
Coverage across infrastructure, applications, and offensive validation operations.
Continuous detection, prioritization, and lifecycle management across the asset inventory.
Controlled exploit validation for internal and external exposure with operational guardrails.
Scenario-driven simulation to validate control effectiveness and identify realistic attack paths.
SPA/API-focused testing with authenticated flows, token handling, and controlled payload strategy.
mDNS, ARP, header analysis, traffic fingerprints — quickly map local networks without endpoints.
Fast, accurate service detection, versioning and vuln fingerprinting.
Automated AD enumeration, ACL analysis, credential abuse simulation, and safe lateral movement validation.
Graph-based attack-path calculation, prioritized by exploitability and business impact.
Uses real-world tools in non-malicious modes to validate true exploitability (no malware/ransomware). GOV customers may enable additional toolsets under contract.
Modern web, SPA, API testing via public/private proxies and Tor; support for authentication flows, CSRF, JWT, WAF evasion.
Adaptive probe strategies when WAF/IDS is detected — stealthier payloads & timing adjustments.
Define scan scope, approval gates, and role-based access control to functions and data.
Separate access for scanner nodes; limit who can run, view, or configure nodes.
Vulnerability ranking, business-context tagging, and remediation guidance.
The platform includes required scanning & exploitation capabilities — no third-party procurement needed.
Auto-updating database of vulnerabilities, CVEs, exploits, and threat intelligence.
Cloud control plane with distributed scanner nodes across external, internal, and on-prem zones.
Compare availability by module and deployment tier.
| Feature / Tier | VM | ANPT | BAS | Web pentesting | MSSP | GOV |
|---|---|---|---|---|---|---|
| Cloud core | Included | Included | Included | Included | Included | Included |
| Network scanning | Included | Included | Not included | Included | Included | Included |
| Passive reconnaissance | Included | Included | Not included | Included | Included | Included |
| AD scanning | Included | Included | Not included | Not included | Included | Included |
| Network pentesting | Not included | Included | Not included | Not included | Included | Included |
| Web scanning & pentesting | Not included | Not included | Not included | Included | Included | Included |
| Automated exploitation | Not included | Included | Not included | Included | Included | Included |
| Breach attack simulation | Not included | Not included | Included | Included | Included | Included |
| On-prem scanners | Included | Included | Included | Included | Included | Included |
| Cloud scanners | Included | Included | Included | Included | Included | Included |
| Verifiy vulnerability | Not included | Included | Not included | Included | Included | Included |
| Managed service option | Included | Included | Included | Included | Included | Included |
| Emhanced avoid protection | Not included | Not included | Not included | Not included | Not included | Included |
| Full air-gap support | Not included | Not included | Not included | Not included | Not included | Included |
| Full on-prem installation | Not included | Not included | Not included | Not included | Not included | Included |
| Support 24x7 | Included | Included | Included | Included | Included | Included |
Yes. The GOV Edition supports full air-gap deployment, compliance packaging, and optional on-prem orchestration with controlled update channels.
Our red-team analysts operate through the same platform, layering expert-led engagements on top of automated discovery, exploit validation, and reporting.
Pentesterra offers REST APIs, webhooks, ticketing integrations (Jira/ServiceNow), and SIEM export to keep remediation and SOC workflows synchronized.