pentest-checklist by sickn33/antigravity-awesome-skills
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill pentest-checklist提供一份全面的清单,用于规划、执行和跟进渗透测试。确保充分的准备、适当的范围界定以及对已发现漏洞的有效修复。
参考问题:
| 类型 | 目的 | 范围 |
|---|---|---|
| 外部渗透测试 | 评估外部攻击面 | 面向公众的系统 |
| 内部渗透测试 |
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
| 评估内部威胁风险 |
| 内部网络 |
| Web 应用程序测试 | 发现应用程序漏洞 | 特定应用程序 |
| 社会工程学测试 | 测试人员安全意识 | 员工、流程 |
| 红队测试 | 完整的对手模拟 | 整个组织 |
| 因素 | 考虑事项 |
|---|---|
| 资产价值 | 价值越高 = 投资越高 |
| 复杂性 | 系统越多 = 时间越多 |
| 所需深度 | 彻底测试成本更高 |
| 声誉价值 | 品牌公司成本更高 |
预算现实检查:
环境选项:
Production - 真实但风险高
Staging - 更安全但可能与生产环境不同
Clone - 理想但资源密集
常见的预扫描工具:
# 网络漏洞扫描
nmap -sV --script vuln TARGET
# Web 漏洞扫描
nikto -h http://TARGET
云服务提供商政策:
评估标准:
| 因素 | 需要询问的问题 |
|---|---|
| 经验 | 从业年限、类似项目 |
| 方法论 | OWASP、PTES、自定义方法 |
| 报告 | 报告样本、详细程度 |
| 沟通 | 可用性、更新频率 |
测试方法:
| 类型 | 访问级别 | 模拟对象 |
|---|---|---|
| 黑盒 | 无信息 | 外部攻击者 |
| 灰盒 | 部分访问权限 | 具有有限访问权限的内部人员 |
| 白盒 | 完全访问权限 | 内部人员/详细审计 |
报告应包含:
监控工具:
# 检查安全日志
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.log
# 监控网络
tcpdump -i eth0 -w capture.pcap
需要监控的关键日志:
测试频率因素:
□ 范围已定义并记录
□ 已获得授权
□ 环境已准备就绪
□ 已通知托管服务提供商
□ 团队已获知
□ 监控已启用
□ 备份已验证
□ 报告已收到并审查
□ 发现的问题已确定优先级
□ 修复任务已分配
□ 修复已实施
□ 验证测试已安排
□ 环境已清理
□ 下次测试已安排
**目标:** 企业 Web 应用程序 (app.company.com)
**类型:** 灰盒 Web 应用程序渗透测试
**持续时间:** 5 个工作日
**排除项:** DoS 测试、生产数据库访问
**访问权限:** 提供标准用户账户
# 启用全面日志记录
sudo systemctl restart rsyslog
sudo systemctl restart auditd
# 开始数据包捕获
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &
| 问题 | 解决方案 |
|---|---|
| 范围蔓延 | 记录并要求变更批准 |
| 测试影响生产 | 安排在非工作时间、使用预生产环境 |
| 发现的问题存在争议 | 提供详细证据、重新测试 |
| 修复延迟 | 按风险确定优先级、设定截止日期 |
| 预算超支 | 定义明确的范围、固定价格合同 |
此技能适用于执行概述中描述的工作流程或操作。
每周安装次数
191
仓库
GitHub 星标数
27.1K
首次出现
2026 年 2 月 21 日
安全审计
安装于
opencode187
amp186
gemini-cli186
codex186
kimi-cli186
cursor186
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
Reference Questions:
| Type | Purpose | Scope |
|---|---|---|
| External Pentest | Assess external attack surface | Public-facing systems |
| Internal Pentest | Assess insider threat risk | Internal network |
| Web Application | Find application vulnerabilities | Specific applications |
| Social Engineering | Test human security | Employees, processes |
| Red Team | Full adversary simulation | Entire organization |
| Factor | Consideration |
|---|---|
| Asset Value | Higher value = higher investment |
| Complexity | More systems = more time |
| Depth Required | Thorough testing costs more |
| Reputation Value | Brand-name firms cost more |
Budget Reality Check:
Environment Options:
Production - Realistic but risky
Staging - Safer but may differ from production
Clone - Ideal but resource-intensive
Common Pre-Scan Tools:
# Network vulnerability scan
nmap -sV --script vuln TARGET
# Web vulnerability scan
nikto -h http://TARGET
Cloud Provider Policies:
Evaluation Criteria:
| Factor | Questions to Ask |
|---|---|
| Experience | Years in field, similar projects |
| Methodology | OWASP, PTES, custom approach |
| Reporting | Sample reports, detail level |
| Communication | Availability, update frequency |
Testing Approaches:
| Type | Access Level | Simulates |
|---|---|---|
| Black Box | No information | External attacker |
| Gray Box | Partial access | Insider with limited access |
| White Box | Full access | Insider/detailed audit |
Report Should Include:
Monitoring Tools:
# Check security logs
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.log
# Monitor network
tcpdump -i eth0 -w capture.pcap
Key Logs to Monitor:
Testing Frequency Factors:
□ Scope defined and documented
□ Authorization obtained
□ Environment prepared
□ Hosting provider notified
□ Team briefed
□ Monitoring enabled
□ Backups verified
□ Report received and reviewed
□ Findings prioritized
□ Remediation assigned
□ Fixes implemented
□ Verification testing scheduled
□ Environment cleaned up
□ Next test scheduled
**Target:** Corporate web application (app.company.com)
**Type:** Gray box web application pentest
**Duration:** 5 business days
**Excluded:** DoS testing, production database access
**Access:** Standard user account provided
# Enable comprehensive logging
sudo systemctl restart rsyslog
sudo systemctl restart auditd
# Start packet capture
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &
| Issue | Solution |
|---|---|
| Scope creep | Document and require change approval |
| Testing impacts production | Schedule off-hours, use staging |
| Findings disputed | Provide detailed evidence, retest |
| Remediation delayed | Prioritize by risk, set deadlines |
| Budget exceeded | Define clear scope, fixed-price contracts |
This skill is applicable to execute the workflow or actions described in the overview.
Weekly Installs
191
Repository
GitHub Stars
27.1K
First Seen
Feb 21, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykWarn
Installed on
opencode187
amp186
gemini-cli186
codex186
kimi-cli186
cursor186
Linux云主机安全托管指南:从SSH加固到HTTPS部署
33,600 周安装
Dictionary API自动化教程:通过Rube MCP和Composio实现词典API操作自动化
1 周安装
detrack-automation:自动化追踪技能,集成Claude AI提升开发效率
1 周安装
Demio自动化工具包:通过Rube MCP和Composio实现Demio操作自动化
1 周安装
Deel自动化工具:通过Rube MCP与Composio实现HR与薪资操作自动化
1 周安装
Honeycomb (hc) 多智能体任务协调系统使用指南 | 开发者协作与项目管理工具
1 周安装
Liquid Glass 采用参考指南:iOS/macOS 界面材质迁移与无障碍优化
148 周安装