Loading...
Loading...
Expert in ethical hacking, vulnerability assessment, and offensive security testing (Web/Network/Cloud).
npx skill4agent add 404kidwiz/claude-supercode-skills penetration-testerWhat is the target?
│
├─ **Web Application**
│ ├─ API intensive? → **API Test** (Postman/Burp, focus on IDOR/Auth)
│ ├─ Legacy/Monolith? → **OWASP Top 10** (SQLi, XSS, Deserialization)
│ └─ Modern/SPA? → **Client-side attacks** (DOM XSS, CSTI, JWT)
│
├─ **Cloud Infrastructure**
│ ├─ AWS/Azure/GCP? → **Cloud Pentest** (Pacu, ScoutSuite, IAM privesc)
│ └─ Kubernetes? → **Container Breakout** (Capabilities, Role bindings)
│
└─ **Network / Internal**
├─ Active Directory? → **AD Assessment** (BloodHound, Kerberoasting)
└─ External Perimeter? → **Recon + Service Exploitation** (Nmap, Metasploit)| Phase | Category | Tool Recommendation |
|---|---|---|
| Recon | Subdomain Enum | |
| Recon | Content Discovery | |
| Scanning | Vulnerability | |
| Exploitation | Web | |
| Exploitation | Network | |
| Post-Exploitation | Windows/AD | |
| Severity | Score | Criteria | Example |
|---|---|---|---|
| Critical | 9.0 - 10.0 | RCE, Auth Bypass, SQLi (Data dump) | Remote Code Execution |
| High | 7.0 - 8.9 | Stored XSS, IDOR (Sensitive), SSRF | Admin Account Takeover |
| Medium | 4.0 - 6.9 | Reflected XSS, CSRF, Info Disclosure | Stack Trace leakage |
| Low | 0.1 - 3.9 | Cookie flags, Banner grabbing | Missing HttpOnly flag |
legal-advisor# Subdomain discovery
subfinder -d target.com -o subdomains.txt
# Live host verification
httpx -l subdomains.txt -o live_hosts.txtffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200,403' OR 1=1--<script>alert(1)</script>user_id=100user_id=101scout awsiam:PassRoleec2:CreateInstanceProfilesqlmap --os-shelldirbusterSLEEP(5)DROP TABLEadmin.target.comwww.target.com| Vulnerability | CVSS | Impact | Remediation |
|---|---|---|---|
| SQL Injection (Auth Bypass) | 9.8 | Full database access | Parameterized queries |
| Stored XSS (Admin Panel) | 8.1 | Session hijacking | Input sanitization |
| IDOR (Account Takeover) | 7.5 | Unauthorized access | Authorization checks |
| Missing CSP Headers | 5.3 | XSS vulnerability | Implement CSP |
| Finding | Severity | Exploitability | Remediation |
|---|---|---|---|
| BOLA (Broken Object Level Authorization) | Critical | Easy | Add ownership verification |
| Introspection Enabled | Medium | N/A | Disable in production |
| Query Depth Limit Missing | High | Easy | Implement max depth |
| No Rate Limiting | High | Easy | Add rate limiting |