Pentest Checklist by davila7/claude-code-templates
npx skills add https://github.com/davila7/claude-code-templates --skill 'Pentest Checklist'提供全面的检查清单,用于规划、执行和跟进渗透测试。确保充分的准备、适当的范围界定以及发现漏洞的有效修复。
参考问题:
| 类型 | 目的 | 范围 |
|---|---|---|
| 外部渗透测试 | 评估外部攻击面 | 面向公众的系统 |
| 内部渗透测试 |
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
| 评估内部威胁风险 |
| 内部网络 |
| Web 应用程序测试 | 发现应用程序漏洞 | 特定应用程序 |
| 社会工程学测试 | 测试人员安全意识 | 员工、流程 |
| 红队测试 | 完整的对手模拟 | 整个组织 |
| 因素 | 考虑事项 |
|---|---|
| 资产价值 | 价值越高 = 投资越高 |
| 复杂性 | 系统越多 = 时间越多 |
| 所需深度 | 彻底测试成本更高 |
| 声誉价值 | 品牌公司成本更高 |
预算现实检查:
环境选项:
Production - 真实但风险高
Staging - 更安全但可能与生产环境不同
Clone - 理想但资源密集
常用预扫描工具:
# 网络漏洞扫描
nmap -sV --script vuln TARGET
# Web 漏洞扫描
nikto -h http://TARGET
云提供商政策:
评估标准:
| 因素 | 要问的问题 |
|---|---|
| 经验 | 从业年限、类似项目 |
| 方法论 | OWASP、PTES、自定义方法 |
| 报告 | 样本报告、详细程度 |
| 沟通 | 可用性、更新频率 |
测试方法:
| 类型 | 访问级别 | 模拟 |
|---|---|---|
| 黑盒 | 无信息 | 外部攻击者 |
| 灰盒 | 部分访问 | 访问受限的内部人员 |
| 白盒 | 完全访问 | 内部人员/详细审计 |
报告应包含:
监控工具:
# 检查安全日志
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.log
# 监控网络
tcpdump -i eth0 -w capture.pcap
要监控的关键日志:
测试频率因素:
□ 范围已定义并记录
□ 已获得授权
□ 环境已准备
□ 已通知托管提供商
□ 团队已简要说明
□ 监控已启用
□ 备份已验证
□ 报告已接收并审查
□ 发现的问题已确定优先级
□ 修复任务已分配
□ 修复已实施
□ 验证测试已安排
□ 环境已清理
□ 下次测试已安排
**目标:** 企业 Web 应用程序 (app.company.com)
**类型:** 灰盒 Web 应用程序渗透测试
**持续时间:** 5 个工作日
**排除项:** DoS 测试、生产数据库访问
**访问权限:** 提供标准用户账户
# 启用全面日志记录
sudo systemctl restart rsyslog
sudo systemctl restart auditd
# 启动数据包捕获
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &
| 问题 | 解决方案 |
|---|---|
| 范围蔓延 | 记录并要求变更批准 |
| 测试影响生产 | 安排非工作时间、使用预生产环境 |
| 发现的问题有争议 | 提供详细证据、重新测试 |
| 修复延迟 | 按风险确定优先级、设置截止日期 |
| 预算超支 | 定义明确范围、固定价格合同 |
每周安装次数
0
仓库
GitHub 星标数
22.6K
首次出现时间
1970年1月1日
安全审计
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
Reference Questions:
| Type | Purpose | Scope |
|---|---|---|
| External Pentest | Assess external attack surface | Public-facing systems |
| Internal Pentest | Assess insider threat risk | Internal network |
| Web Application | Find application vulnerabilities | Specific applications |
| Social Engineering | Test human security | Employees, processes |
| Red Team | Full adversary simulation | Entire organization |
| Factor | Consideration |
|---|---|
| Asset Value | Higher value = higher investment |
| Complexity | More systems = more time |
| Depth Required | Thorough testing costs more |
| Reputation Value | Brand-name firms cost more |
Budget Reality Check:
Environment Options:
Production - Realistic but risky
Staging - Safer but may differ from production
Clone - Ideal but resource-intensive
Common Pre-Scan Tools:
# Network vulnerability scan
nmap -sV --script vuln TARGET
# Web vulnerability scan
nikto -h http://TARGET
Cloud Provider Policies:
Evaluation Criteria:
| Factor | Questions to Ask |
|---|---|
| Experience | Years in field, similar projects |
| Methodology | OWASP, PTES, custom approach |
| Reporting | Sample reports, detail level |
| Communication | Availability, update frequency |
Testing Approaches:
| Type | Access Level | Simulates |
|---|---|---|
| Black Box | No information | External attacker |
| Gray Box | Partial access | Insider with limited access |
| White Box | Full access | Insider/detailed audit |
Report Should Include:
Monitoring Tools:
# Check security logs
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.log
# Monitor network
tcpdump -i eth0 -w capture.pcap
Key Logs to Monitor:
Testing Frequency Factors:
□ Scope defined and documented
□ Authorization obtained
□ Environment prepared
□ Hosting provider notified
□ Team briefed
□ Monitoring enabled
□ Backups verified
□ Report received and reviewed
□ Findings prioritized
□ Remediation assigned
□ Fixes implemented
□ Verification testing scheduled
□ Environment cleaned up
□ Next test scheduled
**Target:** Corporate web application (app.company.com)
**Type:** Gray box web application pentest
**Duration:** 5 business days
**Excluded:** DoS testing, production database access
**Access:** Standard user account provided
# Enable comprehensive logging
sudo systemctl restart rsyslog
sudo systemctl restart auditd
# Start packet capture
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &
| Issue | Solution |
|---|---|
| Scope creep | Document and require change approval |
| Testing impacts production | Schedule off-hours, use staging |
| Findings disputed | Provide detailed evidence, retest |
| Remediation delayed | Prioritize by risk, set deadlines |
| Budget exceeded | Define clear scope, fixed-price contracts |
Weekly Installs
0
Repository
GitHub Stars
22.6K
First Seen
Jan 1, 1970
Security Audits
Linux云主机安全托管指南:从SSH加固到HTTPS部署
27,400 周安装