Pentest Basics

Legal Notice: Only perform penetration testing on systems you own or have explicit written authorization to test. Unauthorized testing is illegal in most jurisdictions.

Penetration Testing Phases

PhaseActivitiesKey Tools
1. Planning & ScopingDefine scope, rules of engagement, authorizationWritten agreement, scope document
2. ReconnaissanceOSINT, DNS enumeration, port scanningShodan, theHarvester, whois, nmap
3. Scanning & EnumerationVulnerability scanning, service detectionNmap, Nikto, Nessus, OpenVAS
4. ExploitationExploiting vulnerabilities to gain accessMetasploit, Burp Suite, SQLmap
5. Post-ExploitationPrivilege escalation, lateral movement, persistenceMimikatz, PowerSploit, Cobalt Strike
6. ReportingDocument findings, risk ratings, remediationCVSS scoring, Dradis, custom templates

Nmap Common Commands

# Quick scan (top 100 ports) nmap -F target.com # Full port scan nmap -p- target.com # Service/version detection nmap -sV -p 80,443,22 target.com # OS detection (requires root) nmap -O target.com # Aggressive scan (OS + version + scripts) nmap -A target.com # Scan subnet nmap 192.168.1.0/24 # Output to file nmap -oN output.txt target.com

Web Application Testing Checklist

CategoryTests
AuthenticationDefault creds, brute force, MFA bypass, password reset flaws
AuthorizationIDOR, privilege escalation, horizontal/vertical access control
Input HandlingSQLi, XSS, XXE, SSTI, command injection
Session ManagementToken prediction, fixation, CSRF, insecure cookies
Business LogicPrice manipulation, quantity bypass, workflow flaws
API SecurityMass assignment, rate limiting, endpoint exposure

CVSS Severity Ratings

ScoreSeverityAction
9.0–10.0CriticalPatch immediately
7.0–8.9HighPatch within 30 days
4.0–6.9MediumPatch within 90 days
0.1–3.9LowPatch in next release
0.0NoneInformational