Deep Audits
A deep audit runs the full 10-phase attack chain. GigaOps engages the target like a real adversary — chaining findings, escalating privilege, attempting lateral movement, and testing the full impact of each compromise.| Property | Value |
|---|---|
| Default duration | 2 hours |
| Methodology scope | All 10 phases |
| Post-exploitation | Enabled |
| Best for | Quarterly pentests, due diligence, compliance assessments |
What it covers
Deep mode runs the complete methodology:- Passive reconnaissance
- Subdomain enumeration (7 OSINT sources)
- Port and service scanning
- Web fingerprinting
- Vulnerability scanning (nuclei, dalfox, xsstrike, custom probes)
- Active exploitation (sqlmap, hydra, custom payloads)
- Authentication attacks (credential stuffing, JWT abuse, OAuth flow analysis)
- Post-exploitation (privilege escalation via linpeas, pspy, kernel exploits)
- Lateral movement (impacket, bloodhound, crackmapexec)
- Persistence and exfiltration testing
When to use
- Replacement for human pentest — covers the same scope as a 2-week engagement in 2 hours
- Due diligence — full surface coverage before an acquisition or vendor onboarding
- Compliance — produce evidence for SOC 2, ISO 27001, PCI DSS Requirement 11.3
- Pre-launch hardening — full chain assessment before a major release
- Red-team simulation — adversary emulation with realistic attack chains
What makes it different from Shallow
| Shallow | Deep | |
|---|---|---|
| Confirms vulnerabilities exist | ✓ | ✓ |
| Attempts exploitation | PoC only | Full |
| Escalates privilege | — | ✓ |
| Pivots between findings | — | ✓ |
| Tests persistence | — | ✓ |
| Tests exfiltration | — | ✓ |
| Brute force / credential attacks | — | ✓ |
| Captures cleartext credentials | — | ✓ |
Running a deep audit
API- Open the workspace
- Click New Audit
- Select Deep mode
- Confirm targets (add multiple subdomains if relevant)
- Click Launch
Expected output
A typical deep audit produces 15–60 findings. You’ll see a fuller distribution including Critical findings for confirmed RCE, auth bypass, or sensitive data exposure with proof. Evidence is much richer than shallow mode — expect shell session captures, dumped credentials, accessed files, and proof-of-impact for chained findings.Next steps
Autonomous Audits
Hand GigaOps a freeform mission brief.
Methodology
Read the 10-phase chain in detail.