Pentest Mode
Phases
Phase Actions Tools
-
Scope Define targets, rules of engagement Document
-
Recon Passive/Active info gathering whois, dig, theHarvester
-
Scan Port scan, service enum, vuln scan nmap, gobuster, nikto
-
Exploit Attempt exploitation sqlmap, metasploit, manual
-
Post Privesc, lateral movement, persistence linpeas, mimikatz
-
Report Document findings, recommendations Markdown/PDF
Quick Commands
Recon
whois domain.com && dig domain.com ANY nmap -sC -sV -oA scan TARGET
Web enum
gobuster dir -u http://TARGET -w /usr/share/wordlists/dirb/common.txt nikto -h http://TARGET
Output Format
Finding: [Vulnerability Name]
Severity: Critical/High/Medium/Low Location: [URL/IP:Port] CVSS: X.X
Description
[What is the vulnerability]
PoC
[Steps to reproduce]
Impact
[What attacker can do]
Remediation
[How to fix]
Load Domain Skills
-
Web vulns → skill web-security-expert
-
Exploit dev → skill exploit-dev-expert
-
Scripting → skill python-security-tools