seclens-enterprise-web
Pentest Enterprise Web
Purpose
Perform comprehensive vulnerability assessments on web applications and APIs (REST/GraphQL) to identify security flaws, logic errors, and compliance issues.
Prerequisites
Authorization Requirements
- Written authorization (scope document signed by asset owner)
- Target environment classification: Internal / External / Hybrid
- Rules of Engagement: Testing hours, notification procedures, emergency contacts
Evasion Profile Selection
| Profile | Use Case | Characteristics |
|---|---|---|
| Quiet | Production systems, WAF-protected targets | Low request rate, header rotation, timing jitter |
| Standard | Staging environments, time-limited tests | Balanced speed/stealth |
| Aggressive | Internal networks, comprehensive coverage | Maximum parallelism, full payloads |
Environment Setup
- Docker container with
network_mode: hostfor complete network access - Volume mount for persistent reports:
./reports:/data - Minimum 4GB RAM allocated
Core Workflow
- Scope & Recon: Identify target scope, technologies, and entry points using
httpxandwhatweb. - Content Discovery: Enumerate endpoints, hidden directories, and API routes using
dirsearch,ffuf, andkatana. - Vulnerability Scanning: Automated scanning for common flaws (XSS, SQLi, CVEs) using
nucleiandnikto. - Authentication Testing: Test login flows, JWT handling, session management, MFA bypass vectors.
- Business Logic Testing: Manual testing for price manipulation, race conditions, IDOR, workflow bypass.
- Dependency Scanning: Analyze third-party components for known CVEs using
pip-audit,trivy. - Manual Verification: Verify automated findings and test complex business logic using
burpsuiteorzap. - Exploitation (Safe): Demonstrate impact of critical findings (e.g., SQLi, RCE) using
sqlmapor custom scripts. - Reporting: Aggregate findings into structured report using
references/report-template.md.
OWASP Top 10 (2021) Coverage
| Category | Workflow | Primary Tools | Status |
|---|---|---|---|
| A01 Broken Access Control | business_logic_testing |
browser_agent, http_repeater, IDOR enumeration | ✅ |
| A02 Cryptographic Failures | vulnerability_assessment |
nuclei (crypto tags), manual TLS review | ✅ |
| A03 Injection | vulnerability_assessment |
sqlmap, dalfox, nuclei (injection templates) | ✅ |
| A04 Insecure Design | business_logic_testing |
manual testing, race condition scripts | ✅ |
| A05 Security Misconfiguration | web_reconnaissance |
nuclei (misconfig tags), nikto, httpx | ✅ |
| A06 Vulnerable Components | dependency_scanning |
pip-audit, npm-audit, trivy | ✅ |
| A07 Auth Failures | authentication_testing |
jwt_analyzer, http_intruder, browser_agent | ✅ |
| A08 Software/Data Integrity | dependency_scanning |
trivy (image scan), gitleaks | ✅ |
| A09 Logging Failures | vulnerability_assessment |
manual review, log injection testing | ⚠️ Partial |
| A10 SSRF | vulnerability_assessment |
nuclei (ssrf tags), interactsh (OOB) | ✅ |
Tool Categories
| Category | Tools | Purpose |
|---|---|---|
| Reconnaissance | httpx, katana, gau, waybackurls | Asset discovery, technology fingerprinting |
| Content Discovery | dirsearch, ffuf, gobuster, feroxbuster | Hidden endpoints, directories |
| Vulnerability Scanning | nuclei, nikto, jaeles | Automated CVE/misconfiguration detection |
| Injection Testing | sqlmap, dalfox, xsser | SQL, XSS, command injection |
| API Security | arjun, graphql_scanner, jwt_analyzer | API-specific vulnerabilities |
| Auth Testing | http_intruder, browser_agent | Credential stuffing, session attacks |
| Dependency Scanning | pip-audit, npm-audit, trivy | Third-party component CVEs |
| OOB Detection | interactsh | Blind SSRF, RCE, XXE verification |
| Interactive | burpsuite, zaproxy, browser_agent | Manual testing, complex flows |
| Reporting | pandoc, wkhtmltopdf | PDF/HTML report generation |
References
references/tools.md- Tool function signatures and parametersreferences/workflows.md- Attack pattern definitionsreferences/report-template.md- Vulnerability report template
More from jd-opensource/joysafeter
pentest-osint-recon
Open Source Intelligence gathering and attack surface management for external reconnaissance.
84pentest-mobile-app
OWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections.
56pentest-api-deep
Deep OWASP API Security Top 10 testing for REST, GraphQL, gRPC, and WebSocket APIs — BFLA, mass assignment, rate limiting, and unsafe consumption.
55pentest-exploit-validation
Proof-driven exploitation with 4-level evidence system, bypass exhaustion protocol, mandatory evidence checklists, and strict EXPLOITED/POTENTIAL/FALSE_POSITIVE classification.
53pentest-secrets-exposure
Discover hardcoded credentials, leaked API keys, exposed configuration files, sensitive data in artifacts, and information disclosure via error handling.
50pentest-ai-llm-security
AI/LLM application security testing — prompt injection, jailbreaking, data exfiltration, and insecure output handling per OWASP LLM Top 10.
49