skills/jd-opensource/joysafeter/seclens-enterprise-web

seclens-enterprise-web

SKILL.md

Pentest Enterprise Web

Purpose

Perform comprehensive vulnerability assessments on web applications and APIs (REST/GraphQL) to identify security flaws, logic errors, and compliance issues.

Prerequisites

Authorization Requirements

  • Written authorization (scope document signed by asset owner)
  • Target environment classification: Internal / External / Hybrid
  • Rules of Engagement: Testing hours, notification procedures, emergency contacts

Evasion Profile Selection

Profile Use Case Characteristics
Quiet Production systems, WAF-protected targets Low request rate, header rotation, timing jitter
Standard Staging environments, time-limited tests Balanced speed/stealth
Aggressive Internal networks, comprehensive coverage Maximum parallelism, full payloads

Environment Setup

  • Docker container with network_mode: host for complete network access
  • Volume mount for persistent reports: ./reports:/data
  • Minimum 4GB RAM allocated

Core Workflow

  1. Scope & Recon: Identify target scope, technologies, and entry points using httpx and whatweb.
  2. Content Discovery: Enumerate endpoints, hidden directories, and API routes using dirsearch, ffuf, and katana.
  3. Vulnerability Scanning: Automated scanning for common flaws (XSS, SQLi, CVEs) using nuclei and nikto.
  4. Authentication Testing: Test login flows, JWT handling, session management, MFA bypass vectors.
  5. Business Logic Testing: Manual testing for price manipulation, race conditions, IDOR, workflow bypass.
  6. Dependency Scanning: Analyze third-party components for known CVEs using pip-audit, trivy.
  7. Manual Verification: Verify automated findings and test complex business logic using burpsuite or zap.
  8. Exploitation (Safe): Demonstrate impact of critical findings (e.g., SQLi, RCE) using sqlmap or custom scripts.
  9. Reporting: Aggregate findings into structured report using references/report-template.md.

OWASP Top 10 (2021) Coverage

Category Workflow Primary Tools Status
A01 Broken Access Control business_logic_testing browser_agent, http_repeater, IDOR enumeration
A02 Cryptographic Failures vulnerability_assessment nuclei (crypto tags), manual TLS review
A03 Injection vulnerability_assessment sqlmap, dalfox, nuclei (injection templates)
A04 Insecure Design business_logic_testing manual testing, race condition scripts
A05 Security Misconfiguration web_reconnaissance nuclei (misconfig tags), nikto, httpx
A06 Vulnerable Components dependency_scanning pip-audit, npm-audit, trivy
A07 Auth Failures authentication_testing jwt_analyzer, http_intruder, browser_agent
A08 Software/Data Integrity dependency_scanning trivy (image scan), gitleaks
A09 Logging Failures vulnerability_assessment manual review, log injection testing ⚠️ Partial
A10 SSRF vulnerability_assessment nuclei (ssrf tags), interactsh (OOB)

Tool Categories

Category Tools Purpose
Reconnaissance httpx, katana, gau, waybackurls Asset discovery, technology fingerprinting
Content Discovery dirsearch, ffuf, gobuster, feroxbuster Hidden endpoints, directories
Vulnerability Scanning nuclei, nikto, jaeles Automated CVE/misconfiguration detection
Injection Testing sqlmap, dalfox, xsser SQL, XSS, command injection
API Security arjun, graphql_scanner, jwt_analyzer API-specific vulnerabilities
Auth Testing http_intruder, browser_agent Credential stuffing, session attacks
Dependency Scanning pip-audit, npm-audit, trivy Third-party component CVEs
OOB Detection interactsh Blind SSRF, RCE, XXE verification
Interactive burpsuite, zaproxy, browser_agent Manual testing, complex flows
Reporting pandoc, wkhtmltopdf PDF/HTML report generation

References

  • references/tools.md - Tool function signatures and parameters
  • references/workflows.md - Attack pattern definitions
  • references/report-template.md - Vulnerability report template
Weekly Installs
20
GitHub Stars
175
First Seen
Feb 18, 2026
Installed on
gemini-cli20
github-copilot20
codex20
amp20
kimi-cli20
cursor20