pentest-recon-surface-analysis

Security assessment skill for reconnaissance, endpoint/service enumeration, and attack-surface mapping. Use when prompts include recon, enumerate, map endpoints, discover assets, inventory interfaces, fingerprint technologies, or identify control-plane surfaces. Do not use when the request is exploit development, payload execution, or final report writing only.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-recon-surface-analysis" with this command: npx skills add crtvrffnrt/skills/crtvrffnrt-skills-pentest-recon-surface-analysis

Recon & Surface Analysis

Activation Triggers (Positive)

  • recon
  • enumerate
  • surface map
  • asset inventory
  • endpoint discovery
  • technology fingerprinting
  • control plane mapping
  • ffuf
  • vhost fuzzing
  • subdomain enumeration

Exclusion Triggers (Negative)

  • build exploit
  • weaponize payload
  • write final report
  • only validate known vulnerability

Output Schema

  • Surface inventory: asset, interface, auth state, confidence
  • Entry-point matrix: input, trust boundary, initial risk hypothesis
  • Prioritized next tests: ordered by likely impact and test cost

Instructions

  1. Build an explicit target model first: interfaces, trust boundaries, and identity contexts.
  2. Enumerate only what is necessary to expose actionable attack paths.
  3. Normalize findings into a deduplicated inventory before deeper testing.
  4. Label each surface with attacker preconditions and probable abuse class.
  5. Mark unknowns that block progression and propose the minimum test to resolve each.
  6. Hand off precise, testable targets to downstream skills.

Should Do

  • Keep reconnaissance hypothesis-driven, not tool-driven.
  • Capture reproducible evidence for each discovered surface.
  • Prioritize externally reachable and privilege-sensitive paths.

Should Not Do

  • Do not claim vulnerabilities at recon stage without abuse validation.
  • Do not perform heavy fuzzing or exploit attempts here.
  • Don't include organization-specific URLs, identifiers, or credentials in reusable guidance.

Tip: Fuzzing for Virtual Hosts with FFUF

Discover assets not listed in DNS by testing different Host header values. FFUF is the ideal tool for this speed-efficient enumeration.

Quick Guide

  1. Optimize: Use small wordlists and fast scans to ensure the agent doesn't get stuck.
  2. Execute: ffuf -u $TARGET -H "Host: FUZZ.$TARGET" -w /path/to/small_wordlist
  3. Filter: Identify live hosts by filtering unique response sizes or status codes (e.g., -fs [size] or -mc 200).

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

pentest-exploit-execution-payload-control

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-business-logic-abuse

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-gemini-sub-htb

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-input-protocol-manipulation

No summary provided by upstream source.

Repository SourceNeeds Review