@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,305 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
# Full Recon Standard Operating Procedure
|
|
4
|
+
|
|
5
|
+
This document is for [FULL RECON] engagements ONLY.
|
|
6
|
+
For [SPECIFIC TASK] requests, do NOT follow this SOP — execute only what was asked.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## Workspace Structure
|
|
11
|
+
|
|
12
|
+
You execute commands inside the Docker Sandbox. CWD is already the target workspace root.
|
|
13
|
+
|
|
14
|
+
REQUIRED STRUCTURE (AUTO-CREATED — do NOT run mkdir manually):
|
|
15
|
+
|
|
16
|
+
output/ — MANDATORY for all tool outputs
|
|
17
|
+
command/ — system-managed logs. READ ONLY.
|
|
18
|
+
tools/ — MANDATORY for all custom scripts you create (e.g., Python/Bash).
|
|
19
|
+
vulnerabilities/ — ONLY write here via create_vulnerability_report tool.
|
|
20
|
+
|
|
21
|
+
CRITICAL: NEVER use absolute paths starting with /workspace/. ALWAYS use relative paths.
|
|
22
|
+
Correct tool output: output/file.txt
|
|
23
|
+
Correct custom script: tools/exploit.py
|
|
24
|
+
Wrong: /workspace/target/output/file.txt
|
|
25
|
+
Wrong: output/exploit.py (scripts go in tools/)
|
|
26
|
+
|
|
27
|
+
SUBDOMAIN DIRECTORY RULE: ALL outputs and vulnerabilities for subdomains (e.g. `help.target.com`) MUST be saved inside the primary target's workspace folder (e.g. `workspace/target.com/output/` or `workspace/target.com/vulnerabilities/`). NEVER create new top-level workspace folders for individual subdomains.
|
|
28
|
+
|
|
29
|
+
If a tool fails to output to the directory, move it immediately: mv raw_output.txt output/
|
|
30
|
+
|
|
31
|
+
---
|
|
32
|
+
|
|
33
|
+
## Engagement Rules
|
|
34
|
+
|
|
35
|
+
BROWSER MANDATE: Use browser_action on EVERY web target — NO EXCEPTIONS.
|
|
36
|
+
Visit the site, extract view_source, check for hidden comments, API keys in JS, DOM vulnerabilities.
|
|
37
|
+
Use get_console_logs to find React/Vue errors that leak info.
|
|
38
|
+
This is MANDATORY before any scanner is aimed at the target.
|
|
39
|
+
|
|
40
|
+
CAIDO MANDATE: Caido is the mandatory web proxy for ALL HTTP traffic inspection in this engagement.
|
|
41
|
+
|
|
42
|
+
STEP 1 — Start Caido (do this ONCE at the beginning of every engagement):
|
|
43
|
+
execute: caido-setup
|
|
44
|
+
→ Output includes the Bearer token. Save it:
|
|
45
|
+
TOKEN="<token from output>"
|
|
46
|
+
|
|
47
|
+
STEP 2 — Route ALL manual HTTP traffic through Caido:
|
|
48
|
+
All curl commands must use: curl -x http://127.0.0.1:48080 -k <url>
|
|
49
|
+
All browser_action calls already route through Caido automatically.
|
|
50
|
+
Python requests/httpx: set proxies={"https://": "http://127.0.0.1:48080"} and verify=False.
|
|
51
|
+
|
|
52
|
+
STEP 3 — After manual browsing/spidering, query captured history:
|
|
53
|
+
execute: curl -sL -X POST -H "Content-Type: application/json" \
|
|
54
|
+
-H "Authorization: Bearer $TOKEN" \
|
|
55
|
+
-d '{"query":"query { requestsByOffset(limit:200, offset:0, filter:{httpql:\"host.eq:TARGET\"}) { edges { node { id method path response { statusCode length } } } count { value } } }"}' \
|
|
56
|
+
http://127.0.0.1:48080/graphql | jq '.data.requestsByOffset.edges[].node'
|
|
57
|
+
|
|
58
|
+
Or use AIRecon tool: caido_list_requests with filter 'host.eq:"TARGET"'
|
|
59
|
+
|
|
60
|
+
STEP 3b — Browse sitemap to enumerate ALL discovered paths:
|
|
61
|
+
Use AIRecon tool: caido_sitemap (no parent_id) → lists root domains
|
|
62
|
+
Then pass node id as parent_id to drill into directories/endpoints
|
|
63
|
+
|
|
64
|
+
STEP 3c — Monitor intercept status and forward/drop queued requests:
|
|
65
|
+
Use AIRecon tool: caido_intercept with action="status" → check RUNNING/PAUSED
|
|
66
|
+
Use action="list" to see queued messages, "forward"/"drop" to handle them
|
|
67
|
+
|
|
68
|
+
STEP 4 — Use Caido Replay for manual testing of specific requests:
|
|
69
|
+
Retrieve raw request: query { request(id:"ID") { raw response { raw statusCode } } }
|
|
70
|
+
Replay with modification: createReplaySession → startReplayTask with modified raw (base64).
|
|
71
|
+
Or use AIRecon tool: caido_send_request with request_id or raw_http
|
|
72
|
+
|
|
73
|
+
STEP 5 — Use Caido Automate for targeted fuzzing of a confirmed injection point:
|
|
74
|
+
createAutomateSession → updateAutomateSession (set raw + placeholder offsets + payload list)
|
|
75
|
+
→ startAutomateTask → query results for anomalous status codes/lengths.
|
|
76
|
+
Or use AIRecon tool: caido_automate with raw_http containing §FUZZ§ markers
|
|
77
|
+
|
|
78
|
+
For full GraphQL API reference: read_file the caido skill document listed in <available_skills>.
|
|
79
|
+
|
|
80
|
+
SCRIPTING MANDATE: If a tool does not exist for a specific check, WRITE IT.
|
|
81
|
+
Create tools/fuzz_login.py to brute force a specific parameter.
|
|
82
|
+
Create tools/extract_tokens.py to parse complex JS.
|
|
83
|
+
|
|
84
|
+
CHAINING (THE EXPERT WAY): observation -> manual mapping -> correlated fuzzing -> custom exploit.
|
|
85
|
+
Do NOT blindly run automated scanners back-to-back (e.g., throwing nuclei at httpx output).
|
|
86
|
+
|
|
87
|
+
ADVANCED EXECUTION (NO SHORTCUTS):
|
|
88
|
+
1. Understand the Target First: You must know WHAT you are attacking before you fire a tool. Use the browser and `curl` to learn the application's logic.
|
|
89
|
+
2. Contextual Execution: If you find an API, do not blind-fuzz it. Read the JS, find the schema, and craft targeted GraphQL/REST payloads via `execute`.
|
|
90
|
+
3. Custom Tooling: Default tools fail on bespoke logic. If you suspect an IDOR, write a custom Python script to test sequential IDs rather than relying on generic scanners.
|
|
91
|
+
4. Analyze, Don't Just Report: Finding a port 8080 during a scan means NOTE its specific technology stack — do NOT move on without correlating it to known CVEs or business logic flaws.
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## CRITICAL GATE: Live Hosts Are NOT Scanner Targets
|
|
96
|
+
|
|
97
|
+
Whenever any tool produces a list of live hosts or reachable URLs, you MUST treat this output as
|
|
98
|
+
raw intelligence data — the beginning of investigation, not a ready-made input for automated scanning.
|
|
99
|
+
|
|
100
|
+
WRONG (CRITICAL FAILURE — signals complete lack of understanding):
|
|
101
|
+
Discovered live hosts → immediately run any automated vulnerability scanner against the list
|
|
102
|
+
Discovered live hosts → immediately run any injection tester against each host root
|
|
103
|
+
Obtained a URL list → loop through and feed each entry into any automated scanner
|
|
104
|
+
These behaviors are forbidden regardless of which specific tool is used.
|
|
105
|
+
|
|
106
|
+
RIGHT (Mandatory Procedure — applied to EVERY live host, one by one):
|
|
107
|
+
STEP A: Manually visit the host using the browser. View the page source. Read the front-end code.
|
|
108
|
+
Note the application's purpose, behavior, and any clues visible to an anonymous visitor.
|
|
109
|
+
STEP B: Manually probe the host with raw HTTP requests. Document every response header
|
|
110
|
+
that reveals server type, application framework, authentication mechanism, or backend hints.
|
|
111
|
+
STEP C: Fetch publicly accessible metadata paths (robots.txt, sitemap.xml, crossdomain.xml,
|
|
112
|
+
.well-known/, security.txt) and read their full content.
|
|
113
|
+
STEP D: Document your findings for this host in output/host_profiles.json:
|
|
114
|
+
{ "host": "...", "app_type": "...", "tech_stack": "...",
|
|
115
|
+
"auth_mechanism": "...", "input_vectors": [...], "interesting_endpoints": [...] }
|
|
116
|
+
STEP E: Based on the documented profile, make a JUSTIFIED decision about whether any category
|
|
117
|
+
of automated testing is applicable to this host — and why.
|
|
118
|
+
|
|
119
|
+
A documented host profile MUST exist before any automated scanner is aimed at that host.
|
|
120
|
+
Automated scanning without a host profile is a TASK FAILURE.
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
## Definitions (NON-NEGOTIABLE — Read Before Starting)
|
|
125
|
+
|
|
126
|
+
### "Live Host" Definition
|
|
127
|
+
A host is LIVE if a live-host probe returns ANY of these HTTP status codes: 200, 201, 204, 301, 302, 307, 400, 401, 403, 404, 405, 429, 500, 503.
|
|
128
|
+
A host is DEAD only if: connection refused, connection timeout, DNS NXDOMAIN.
|
|
129
|
+
Concrete check: run live host detection tool → output/live_hosts.txt
|
|
130
|
+
See tool_catalog.md → Phase 1 Tools → Live Host Detection for specific command.
|
|
131
|
+
A "live host" = any line in live_hosts.txt that contains an HTTP status code.
|
|
132
|
+
DO NOT skip 401/403 targets — they are often the most interesting.
|
|
133
|
+
|
|
134
|
+
### "Phase Complete" Criteria
|
|
135
|
+
Phase N is complete when ALL of the following are TRUE:
|
|
136
|
+
✓ Minimum number of DISTINCT tools have been run (see each phase)
|
|
137
|
+
✓ Each tool produced at least one output file in output/
|
|
138
|
+
✓ All output files have been verified non-empty: wc -l output/<file>
|
|
139
|
+
✗ FAIL: Running a tool that crashes or produces empty output does NOT count as complete
|
|
140
|
+
✗ FAIL: Running the same tool twice with different flags counts as 1 tool, not 2
|
|
141
|
+
|
|
142
|
+
### "Distinct Tool" Definition
|
|
143
|
+
A "distinct tool" is counted by the BINARY NAME, not the flags:
|
|
144
|
+
✓ subfinder + amass = 2 distinct tools
|
|
145
|
+
✗ subfinder -d target1 + subfinder -d target2 = 1 tool (same binary)
|
|
146
|
+
✗ nmap -sV + nmap -sC = 1 tool (same binary)
|
|
147
|
+
|
|
148
|
+
---
|
|
149
|
+
|
|
150
|
+
## Phase 1 — Architectural Observation & Threat Modeling
|
|
151
|
+
|
|
152
|
+
COMPLETE CRITERIA: You have built a deep, manual understanding of the target's business logic, technology stack, and hidden attack surface. You must document this in `output/target_map.json`.
|
|
153
|
+
FORBIDDEN MINDSET: Using automated discovery scanners before manual observation. Do not rely on "push-button" tools. You must act like an advanced threat actor conducting tailored reconnaissance.
|
|
154
|
+
|
|
155
|
+
PHASE 1 SEQUENCE (MANDATORY ORDER — Do NOT skip or reorder):
|
|
156
|
+
|
|
157
|
+
STEP 1 — PASSIVE INTELLIGENCE (No active probing yet):
|
|
158
|
+
- Enumerate subdomains using passive certificate, DNS API, and archive data sources:
|
|
159
|
+
subfinder -d target.com -all -recursive -o output/subdomains.txt
|
|
160
|
+
amass enum -passive -d target.com >> output/subdomains.txt
|
|
161
|
+
sort -u output/subdomains.txt -o output/subdomains.txt
|
|
162
|
+
→ output/subdomains.txt
|
|
163
|
+
- Resolve all discovered subdomains to live IP addresses using dnsx:
|
|
164
|
+
dnsx -l output/subdomains.txt -a -resp -o output/resolved.txt
|
|
165
|
+
→ output/resolved.txt (only subdomains that resolve to an IP — dead ones removed)
|
|
166
|
+
- Extract historical URLs from archive and crawl data sources:
|
|
167
|
+
gau --subs target.com | sort -u > output/historical_urls.txt
|
|
168
|
+
waybackurls target.com >> output/historical_urls.txt
|
|
169
|
+
→ output/historical_urls.txt
|
|
170
|
+
- Hunt for exposed secrets in public code repositories using custom regex patterns
|
|
171
|
+
See tool_catalog.md → Phase 1 Tools → Subdomain Enumeration & URL Collection for specific commands.
|
|
172
|
+
POST-CHECK: Verify output/subdomains.txt and output/resolved.txt are non-empty before continuing.
|
|
173
|
+
|
|
174
|
+
STEP 2 — LIVE HOST DETECTION (Reachability check only — no exploit or vuln scanning):
|
|
175
|
+
- Send HTTP probes to ALL resolved subdomains. Record status codes, titles, server headers:
|
|
176
|
+
httpx -l output/subdomains.txt -sc -title -server -o output/live_hosts.txt
|
|
177
|
+
→ output/live_hosts.txt (httpx format: https://host [STATUS] — auto-parsed by AIRecon)
|
|
178
|
+
- IMPORTANT: Only hosts in output/live_hosts.txt are valid targets for any further action.
|
|
179
|
+
Dead/unresolved subdomains from output/subdomains.txt MUST be ignored from this point.
|
|
180
|
+
POST-CHECK: Verify output/live_hosts.txt is non-empty before continuing.
|
|
181
|
+
*** STOP HERE. Do NOT proceed to any automated scanner. Begin STEP 3 immediately. ***
|
|
182
|
+
|
|
183
|
+
STEP 3 — MANDATORY MANUAL PROFILING (Applied to EVERY live host, one by one):
|
|
184
|
+
For EACH host in output/live_hosts.txt, you MUST complete all of the following before moving on:
|
|
185
|
+
a. Manually visit the host using the browser. View page source. Observe application behavior.
|
|
186
|
+
Note what the application does, who it serves, and what data it handles.
|
|
187
|
+
b. Send raw HTTP requests manually. Document every informative response header:
|
|
188
|
+
server type, framework hints, cookie attributes, security headers, authentication clues.
|
|
189
|
+
c. Fetch and read all publicly accessible metadata paths:
|
|
190
|
+
robots.txt, sitemap.xml, crossdomain.xml, .well-known/, security.txt
|
|
191
|
+
d. Identify the application type: login portal, admin panel, API gateway, CMS, data dashboard,
|
|
192
|
+
microservice, developer tool, or other — be specific.
|
|
193
|
+
e. Identify the technology stack: frontend framework, backend language, server software, database
|
|
194
|
+
hints, cloud provider — derive this from observed evidence, not assumption.
|
|
195
|
+
f. Identify the authentication mechanism: session cookie, JWT, API key, OAuth, none, or unknown.
|
|
196
|
+
g. Enumerate all visible input vectors: forms, URL parameters, API endpoints, file upload fields,
|
|
197
|
+
search interfaces, WebSocket connections, GraphQL endpoints.
|
|
198
|
+
h. Write all findings for this host to output/host_profiles.json before moving to the next host.
|
|
199
|
+
*** Proceed to Phase 2 ONLY after EVERY live host has a complete profile in host_profiles.json. ***
|
|
200
|
+
|
|
201
|
+
STEP 4 — FRONT-END & API SCHEMA EXTRACTION (Informed by STEP 3 findings):
|
|
202
|
+
- For every host identified as having a JavaScript-heavy frontend in STEP 3:
|
|
203
|
+
extract the main application bundle, de-obfuscate where necessary, and read it manually.
|
|
204
|
+
- Extract: API endpoint patterns, schema definitions, hidden or deprecated routes,
|
|
205
|
+
hardcoded tokens, internal service references, and client-side authorization logic.
|
|
206
|
+
- Document all extracted intelligence in output/target_map.json.
|
|
207
|
+
|
|
208
|
+
POST-PHASE 1 CHECK (All must be TRUE before advancing to Phase 2):
|
|
209
|
+
[ ] output/subdomains.txt — non-empty
|
|
210
|
+
[ ] output/live_hosts.txt — non-empty
|
|
211
|
+
[ ] output/host_profiles.json — exists and contains a complete profile for EVERY live host
|
|
212
|
+
[ ] output/target_map.json — exists and documents confirmed tech stacks and business logic
|
|
213
|
+
[ ] No automated exploit, vulnerability, or injection scanner has been executed yet
|
|
214
|
+
|
|
215
|
+
### Core Objectives
|
|
216
|
+
The goal is to deeply observe the target's environment and architecture. You must use `browser_action`, `curl`, and your own custom Python scripts to:
|
|
217
|
+
- **Analyze Application State & Flow**: Use the browser to explore the application normally. Monitor how state is passed (cookies, JWT, hidden fields, localStorage). Map out execution flows for high-value actions (registration, checkout, password reset).
|
|
218
|
+
- **Reverse Engineer Frontend Logic**: Extract and de-obfuscate JavaScript. Do not use generic secret scanners; manually read the code to understand API routing, hidden endpoints, deprecated parameters, and client-side validation logic.
|
|
219
|
+
- **Trace Infrastructure Footprints**: Use custom scripts to query historical DNS, certificate transparency logs, and BGP routing. Find the forgotten, unmanaged assets (Shadow IT) that aren't protected by modern WAFs.
|
|
220
|
+
- **Analyze API Architectures**: Identify if the target uses REST, GraphQL, GRPC, or WebSockets. Map out object references (IDs, UUIDs) and authorization boundaries by observing server responses.
|
|
221
|
+
- **Synthesize Context**: Document the technologies in use, the primary business functions, and the "crown jewels" of the application in your `target_map.json`.
|
|
222
|
+
|
|
223
|
+
---
|
|
224
|
+
|
|
225
|
+
## Phase 2 — Bespoke Attack Surface Expansion
|
|
226
|
+
|
|
227
|
+
COMPLETE CRITERIA: You have expanded the attack surface by writing custom scripts to interact with the unique endpoints and logic discovered in Phase 1, AND applied pattern-based filtering to identify injection candidates from collected URLs.
|
|
228
|
+
|
|
229
|
+
### Core Objectives
|
|
230
|
+
Generic scanners assume generic applications. You must build custom tooling tailored to the specific target.
|
|
231
|
+
- **Write Target-Specific Crawlers**: Write Python scripts to deeply recursively crawl API endpoints discovered in Phase 1, prioritizing authenticated routes or hidden API versions (e.g., fuzzing `/api/v1/` vs `/api/internal/`).
|
|
232
|
+
- **Logic Fuzzing**: Do not use generic parameter fuzzers. Write scripts that mutate parameters logically (e.g., changing boolean flags, array injections, JSON type confusion) based on your understanding of the target's backend language (e.g., abusing Node.js prototype pollution or PHP type juggling).
|
|
233
|
+
- **Origin IP Discovery**: Analyze historical IP data and SSL certificates to find the backend servers bypassing Cloudflare/CDN protections. Send custom forged host headers to verify origin identity.
|
|
234
|
+
|
|
235
|
+
### MANDATORY Phase 2 Sequence
|
|
236
|
+
|
|
237
|
+
STEP 2.1 — Filter all collected URLs by vulnerability class (MUST run BEFORE any injection scanner):
|
|
238
|
+
Classify every URL from Phase 1 by suspected vulnerability type.
|
|
239
|
+
Output per class → output/candidates_<type>.txt (xss, sqli, ssrf, redirect, lfi, rce).
|
|
240
|
+
See tool_catalog.md → Phase 2 Tools → URL Filtering for specific commands.
|
|
241
|
+
POST-CHECK: wc -l output/candidates_*.txt — if all 0, URL collection must re-run first.
|
|
242
|
+
|
|
243
|
+
STEP 2.2 — Parameter discovery on interesting endpoints (BEFORE any testing):
|
|
244
|
+
For every endpoint identified in Phase 1 STEP 4 as accepting user input:
|
|
245
|
+
run parameter discovery tools (diff-based and wordlist-based) to find hidden parameters.
|
|
246
|
+
Document all discovered parameters in output/host_profiles.json under "input_vectors".
|
|
247
|
+
See tool_catalog.md → Phase 2 Tools → Parameter Discovery for specific commands.
|
|
248
|
+
|
|
249
|
+
STEP 2.3 — XSS scan on filtered candidates:
|
|
250
|
+
Prerequisite: candidates_xss.txt is non-empty AND at least one URL manually confirmed
|
|
251
|
+
to reflect input (send a canary string with curl, confirm it appears in response).
|
|
252
|
+
Run XSS scanner on the candidate list routing traffic through Caido proxy.
|
|
253
|
+
For VULN results: verify in browser before reporting.
|
|
254
|
+
See tool_catalog.md → Phase 2 Tools → XSS Scanning for specific commands.
|
|
255
|
+
Full dalfox reference: read dalfox.md
|
|
256
|
+
|
|
257
|
+
STEP 2.4 — SQLi manual probe on filtered candidates:
|
|
258
|
+
For each URL in candidates_sqli.txt: send the three probes manually (single-quote,
|
|
259
|
+
boolean diff, time-based). Only after signal confirmed: run SQL injection scanner.
|
|
260
|
+
See tool_catalog.md → Phase 2 Tools → SQLi Probe for specific commands.
|
|
261
|
+
Full SQLi workflow: read sql_injection.md
|
|
262
|
+
|
|
263
|
+
POST-PHASE 2 CHECK:
|
|
264
|
+
[ ] output/candidates_*.txt generated for all vulnerability classes (even if empty)
|
|
265
|
+
[ ] Parameter discovery completed for all endpoints with user input
|
|
266
|
+
[ ] XSS scan results reviewed and VULN findings verified in browser
|
|
267
|
+
[ ] SQLi manual probes completed for all candidates
|
|
268
|
+
|
|
269
|
+
---
|
|
270
|
+
|
|
271
|
+
## Phase 3 — Deep Business Logic & Authorization Testing
|
|
272
|
+
|
|
273
|
+
COMPLETE CRITERIA: You have systematically tested every user role, state transition, and authorization boundary manually.
|
|
274
|
+
|
|
275
|
+
### Core Objectives
|
|
276
|
+
Automated tools cannot find Business Logic flaws. You must manipulate the application's intended workflows.
|
|
277
|
+
- **Authorization Bypass (BOLA/IDOR)**: Manually swap object identifiers (integer IDs, predictable hashes) in requests across different permission levels.
|
|
278
|
+
- **State Manipulation & Race Conditions**: Write custom asynchronous Python scripts to test Time-of-Check to Time-of-Use (TOCTOU) flaws in critical functions like redeeming coupons, transferring funds, or claiming usernames.
|
|
279
|
+
- **Access Control & Multi-Tenancy**: Break tenant isolation. If the app supports organizational accounts, attempt to invite out-of-scope users or read cross-tenant metadata.
|
|
280
|
+
- **Token & Cryptographic Flaws**: Analyze JWTs and session tokens. Attempt algorithm confusion, "None" algorithm attacks, or signature stripping manually.
|
|
281
|
+
|
|
282
|
+
---
|
|
283
|
+
|
|
284
|
+
## Phase 4 — Complex Vulnerability Chaining (Zero-Day Mindset)
|
|
285
|
+
|
|
286
|
+
COMPLETE CRITERIA: You have attempted to chain multiple low-impact observations into high-impact exploits.
|
|
287
|
+
|
|
288
|
+
### Core Objectives
|
|
289
|
+
Expert researchers find zero-days by chaining behaviors that automation misses.
|
|
290
|
+
- **DOM & Client-Side Chaining**: Trace user input from source to sink in the frontend. Combine minor DOM XSS vulnerabilities with CSRF to achieve account takeover or execute privileged actions without user interaction.
|
|
291
|
+
- **Server-Side Request Forgery (SSRF) Pivoting**: Use blind SSRF techniques to scan the internal network (localhost, 169.254.169.254 cloud metadata). Chain SSRF with CRLF injection to bypass internal firewalls.
|
|
292
|
+
- **Cache Poisoning & Desync Attacks**: Manually manipulate HTTP headers (X-Forwarded-Host, X-Original-URL) to poison intermediate caches or cause HTTP Request Smuggling, targeting other users.
|
|
293
|
+
- **Out-Of-Band (OOB) Verification**: Always verify blind vulnerabilities manually by injecting controlled listener payloads (e.g., DNS/HTTP callbacks) into every parameter, header, and path.
|
|
294
|
+
|
|
295
|
+
---
|
|
296
|
+
|
|
297
|
+
## Phase 5 — Full Exploitation & Impact Demonstration
|
|
298
|
+
|
|
299
|
+
Goal: Prove the maximum impact of the vulnerabilities you have discovered manually.
|
|
300
|
+
Action:
|
|
301
|
+
- Document the exact manual steps to reproduce the exploit.
|
|
302
|
+
- Write a clean, focused Proof-of-Concept (Python script or `curl` command block) that demonstrates the vulnerability.
|
|
303
|
+
- Ensure all findings are saved to the `vulnerabilities/` directory using the `create_vulnerability_report` tool.
|
|
304
|
+
|
|
305
|
+
***End of Core Manual Recon Phases. Do not rely on any generic scanners.***
|
|
@@ -0,0 +1,202 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
# Local & Internal Penetration Testing — Methodology Framework
|
|
4
|
+
|
|
5
|
+
How to approach local and internal network penetration testing. This is a reasoning
|
|
6
|
+
framework that teaches methodology, not a tool reference.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## Understanding the Internal Environment
|
|
11
|
+
|
|
12
|
+
Internal networks are fundamentally different from the public internet:
|
|
13
|
+
- Services are often deployed with minimal security (no WAF, no rate limiting)
|
|
14
|
+
- Default configurations and credentials are common
|
|
15
|
+
- Trust relationships between services create lateral movement paths
|
|
16
|
+
- Internal applications expose admin interfaces and debug endpoints
|
|
17
|
+
- Network segmentation may be weak or non-existent
|
|
18
|
+
|
|
19
|
+
Your advantage as an internal attacker: you're already past the perimeter.
|
|
20
|
+
Your goal: demonstrate how deep you can go.
|
|
21
|
+
|
|
22
|
+
---
|
|
23
|
+
|
|
24
|
+
## Core Principle: Map Before You Attack
|
|
25
|
+
|
|
26
|
+
Internal pentesting follows a **discovery-first** approach. You cannot exploit what you
|
|
27
|
+
don't understand. Every phase builds on the previous one.
|
|
28
|
+
|
|
29
|
+
### Phase 1: What's Here?
|
|
30
|
+
|
|
31
|
+
Before testing anything, answer these questions:
|
|
32
|
+
- What hosts are alive on this network/target?
|
|
33
|
+
- What services are running on each host?
|
|
34
|
+
- What technology stack does each service use?
|
|
35
|
+
- What is the purpose of each service?
|
|
36
|
+
|
|
37
|
+
### Phase 2: What's Exposed?
|
|
38
|
+
|
|
39
|
+
For each discovered service, understand its attack surface:
|
|
40
|
+
- Does it require authentication? What kind?
|
|
41
|
+
- Does it have a management interface?
|
|
42
|
+
- Is it using default configuration?
|
|
43
|
+
- What version is it running? Are there known vulnerabilities?
|
|
44
|
+
- Does it expose debugging or status endpoints?
|
|
45
|
+
|
|
46
|
+
### Phase 3: What's Vulnerable?
|
|
47
|
+
|
|
48
|
+
Test each exposed surface methodically:
|
|
49
|
+
- Can I authenticate without valid credentials?
|
|
50
|
+
- Can I access resources I shouldn't?
|
|
51
|
+
- Can I inject data into queries or commands?
|
|
52
|
+
- Can I escalate my privileges?
|
|
53
|
+
- Can I pivot to other services using information from this one?
|
|
54
|
+
|
|
55
|
+
---
|
|
56
|
+
|
|
57
|
+
## Thinking Methodology: Service-Oriented Approach
|
|
58
|
+
|
|
59
|
+
### Pattern: Service Identification → Contextual Testing
|
|
60
|
+
|
|
61
|
+
Every service type has characteristic vulnerabilities. When you identify a service,
|
|
62
|
+
think about what's SPECIFIC to that service type:
|
|
63
|
+
|
|
64
|
+
**Web Applications:**
|
|
65
|
+
- How does authentication work? (session, token, certificate)
|
|
66
|
+
- Where does user input enter the system? (forms, APIs, file uploads)
|
|
67
|
+
- What framework is it built on? What are that framework's known weaknesses?
|
|
68
|
+
- Are there admin panels or dev tools exposed?
|
|
69
|
+
|
|
70
|
+
**Databases:**
|
|
71
|
+
- Can I connect without credentials?
|
|
72
|
+
- What's the authentication mechanism?
|
|
73
|
+
- If I have access, what sensitive data is stored?
|
|
74
|
+
- Can I escalate from data access to code execution?
|
|
75
|
+
|
|
76
|
+
**File Sharing:**
|
|
77
|
+
- What's accessible without authentication?
|
|
78
|
+
- Are there writable shares?
|
|
79
|
+
- What sensitive files are stored? (configs, backups, credentials)
|
|
80
|
+
- Can shared scripts or files be modified for code execution?
|
|
81
|
+
|
|
82
|
+
**Remote Access:**
|
|
83
|
+
- Are weak credentials in use?
|
|
84
|
+
- Are there key-based authentication misconfigurations?
|
|
85
|
+
- What's the user's privilege level after login?
|
|
86
|
+
- Can I escalate from remote access to full control?
|
|
87
|
+
|
|
88
|
+
**Message Queues / Caches:**
|
|
89
|
+
- Do they require authentication at all?
|
|
90
|
+
- What data is stored? (sessions, credentials, application state)
|
|
91
|
+
- Can I modify cached data to affect other users?
|
|
92
|
+
- Can I leverage the service for code execution?
|
|
93
|
+
|
|
94
|
+
### Pattern: Credential Discovery → Reuse
|
|
95
|
+
|
|
96
|
+
Credentials found anywhere should be tested everywhere:
|
|
97
|
+
- Configuration files on one service may contain credentials for another
|
|
98
|
+
- Database dumps may contain user credentials for web applications
|
|
99
|
+
- Environment variables may contain API keys or service accounts
|
|
100
|
+
- Backup files may contain historical credentials still valid elsewhere
|
|
101
|
+
|
|
102
|
+
**Think about:** Every credential is a potential key to another service.
|
|
103
|
+
|
|
104
|
+
### Pattern: Trust Relationships → Lateral Movement
|
|
105
|
+
|
|
106
|
+
Internal services trust each other. Exploit that trust:
|
|
107
|
+
- Service A connects to Service B with stored credentials — find those credentials
|
|
108
|
+
- Application servers connect to databases — find the connection string
|
|
109
|
+
- Internal APIs may not require authentication because "they're internal"
|
|
110
|
+
- Jump hosts and bastion hosts provide paths deeper into the network
|
|
111
|
+
|
|
112
|
+
### Pattern: Information Aggregation → Privilege Escalation
|
|
113
|
+
|
|
114
|
+
Individually weak findings become critical when combined:
|
|
115
|
+
- Low-privilege file read + discovered credential → authenticated access
|
|
116
|
+
- Service misconfiguration + default credential → admin access
|
|
117
|
+
- Admin access on one host + credential reuse → access to more hosts
|
|
118
|
+
- Multiple low-privilege accesses → understanding of full network topology
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## Web Application Testing in Internal Context
|
|
123
|
+
|
|
124
|
+
Internal web applications deserve special attention because they're often:
|
|
125
|
+
- Built with minimal security considerations ("it's internal")
|
|
126
|
+
- Running with elevated privileges
|
|
127
|
+
- Connected to sensitive backend services
|
|
128
|
+
- Exposing admin/debug functionality by default
|
|
129
|
+
|
|
130
|
+
### Approach
|
|
131
|
+
|
|
132
|
+
1. **Understand the application's purpose** — What does it manage? What data does it handle?
|
|
133
|
+
2. **Map all endpoints** — Internal apps often have undocumented admin routes
|
|
134
|
+
3. **Check for authentication bypass** — Many internal apps have no auth or weak auth
|
|
135
|
+
4. **Test authorization** — Can a low-privilege user access admin functions?
|
|
136
|
+
5. **Look for debug/development artifacts** — Stack traces, debug panels, test accounts
|
|
137
|
+
6. **Check backend connections** — SSRF to internal services, database connections
|
|
138
|
+
|
|
139
|
+
### Tool Selection for Internal Web Apps
|
|
140
|
+
|
|
141
|
+
- **curl**: Fast, scriptable, shows raw responses — ideal for API testing and automation
|
|
142
|
+
- **browser_action**: Needed for JavaScript-heavy apps, complex forms, AJAX interactions
|
|
143
|
+
- **Caido proxy**: Essential when you need to intercept and modify complex request flows,
|
|
144
|
+
test race conditions, or analyze multi-step authentication
|
|
145
|
+
- **Custom scripts**: When you need to automate specific testing patterns or parse
|
|
146
|
+
large amounts of data from API responses
|
|
147
|
+
|
|
148
|
+
---
|
|
149
|
+
|
|
150
|
+
## Post-Exploitation Thinking
|
|
151
|
+
|
|
152
|
+
After gaining access, think about:
|
|
153
|
+
|
|
154
|
+
### What can I read?
|
|
155
|
+
- Configuration files with credentials
|
|
156
|
+
- Database contents with sensitive data
|
|
157
|
+
- Application source code
|
|
158
|
+
- Log files with user activity or credentials
|
|
159
|
+
- Backup files and archives
|
|
160
|
+
|
|
161
|
+
### What can I write?
|
|
162
|
+
- Scheduled tasks or cron jobs (persistent access)
|
|
163
|
+
- Configuration files (redirect traffic, disable security)
|
|
164
|
+
- Web application files (webshells)
|
|
165
|
+
- SSH authorized_keys (persistent access)
|
|
166
|
+
|
|
167
|
+
### What can I reach from here?
|
|
168
|
+
- What other hosts does this machine connect to?
|
|
169
|
+
- What credentials are stored on this machine?
|
|
170
|
+
- What network segments are accessible?
|
|
171
|
+
- Are there internal-only services visible from this host?
|
|
172
|
+
|
|
173
|
+
### What's the impact?
|
|
174
|
+
- Can I access customer/user data?
|
|
175
|
+
- Can I modify critical business data?
|
|
176
|
+
- Can I disrupt service availability?
|
|
177
|
+
- Can I achieve full administrative control?
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
## Avoiding Common Mistakes
|
|
182
|
+
|
|
183
|
+
1. **Don't run external recon tools** — OSINT, subdomain enumeration, and cloud storage
|
|
184
|
+
scanning are irrelevant for internal targets
|
|
185
|
+
2. **Don't scan blindly** — Understand what you're targeting before launching scanners
|
|
186
|
+
3. **Don't ignore "boring" services** — File shares, print servers, and legacy systems
|
|
187
|
+
often have the weakest security
|
|
188
|
+
4. **Don't stop at first finding** — Chain findings together for maximum impact
|
|
189
|
+
5. **Don't ignore context** — A low-severity finding on a critical system is high-impact
|
|
190
|
+
6. **Don't forget to check what runs locally** — Services bound to 127.0.0.1 are often
|
|
191
|
+
the most sensitive and least protected
|
|
192
|
+
7. **Don't assume network segmentation works** — Test it
|
|
193
|
+
|
|
194
|
+
---
|
|
195
|
+
|
|
196
|
+
## Summary
|
|
197
|
+
|
|
198
|
+
Internal pentesting is about **understanding the environment deeply** and finding the
|
|
199
|
+
paths of least resistance through it. Map everything, understand trust relationships,
|
|
200
|
+
test each service in its proper context, and chain findings together. The most critical
|
|
201
|
+
vulnerabilities often come from combining multiple seemingly minor issues into a
|
|
202
|
+
significant compromise path.
|