pentest-exploit-validation

Proof-driven exploitation with 4-level evidence system, bypass exhaustion protocol, mandatory evidence checklists, and strict EXPLOITED/POTENTIAL/FALSE_POSITIVE classification.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-exploit-validation" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-exploit-validation

Pentest Exploit Validation

Purpose

Validate vulnerability findings through proof-driven exploitation using Shannon's 4-level evidence system. Consumes the exploitation queue from white-box code review, attempts structured exploitation with bypass exhaustion, collects mandatory evidence per vulnerability type, and classifies each finding as EXPLOITED, POTENTIAL, or FALSE_POSITIVE.

Prerequisites

Authorization Requirements

  • Written authorization with explicit scope for active exploitation testing
  • Exploitation queue JSON from pentest-whitebox-code-review output
  • Test accounts at multiple privilege levels for authz testing
  • Data exfiltration approval — confirm acceptable proof-of-concept scope
  • Rollback plan for any data-mutating exploits

Environment Setup

  • sqlmap for automated SQL injection exploitation
  • Burp Suite Professional with Repeater, Intruder, and Turbo Intruder
  • curl for manual HTTP request crafting
  • Playwright for browser-based exploitation (XSS, CSRF)
  • nuclei with custom templates for automated validation
  • Isolated testing environment or explicit production testing approval

Core Workflow

  1. Queue Intake: Parse exploitation queue JSON, validate schema, prioritize by confidence score and impact severity. Group findings by vulnerability type for parallel exploitation.
  2. Injection Exploitation: Confirm injectable parameter → fingerprint backend (DB type, OS) → enumerate databases/tables → demonstrate data exfiltration with minimal footprint.
  3. XSS Exploitation: Graph traversal from source → processing → sanitization → sink. Craft context-appropriate payload, demonstrate session hijack or DOM manipulation.
  4. Auth Exploitation: Attack authentication weaknesses → demonstrate account takeover via credential stuffing, token forgery, or session hijack.
  5. Authz Exploitation: Horizontal access (cross-user data) → vertical escalation (admin functions) → workflow bypass (state manipulation).
  6. SSRF Exploitation: Internal service access → cloud metadata retrieval (169.254.169.254) → internal network reconnaissance.
  7. Bypass Exhaustion: For each finding, attempt 3 initial payloads → if blocked, escalate to 8-10 bypass variations → if still blocked, deploy automated tool variants.
  8. Impact Escalation: Escalate from proof-of-concept to real impact demonstration — data exfiltration, session hijacking, or remote code execution.
  9. Evidence Collection: Collect mandatory evidence per vulnerability type using per-type checklists.
  10. Classification: Assign final classification — EXPLOITED, POTENTIAL, or FALSE_POSITIVE — based on 4-level proof system.

4-Level Proof System

LevelDescriptionClassification
L1Weakness identified in code but not confirmed exploitablePOTENTIAL
L2Partial bypass achieved but full exploitation not demonstratedPOTENTIAL
L3Vulnerability confirmed with reproducible evidenceEXPLOITED
L4Critical impact demonstrated (data exfil, RCE, account takeover)EXPLOITED CRITICAL

Classification Criteria

ClassificationCriteria
EXPLOITEDReproducible proof with evidence: HTTP request/response, extracted data, or demonstrated impact
POTENTIALCode-level weakness confirmed but exploitation blocked by defense-in-depth or environment constraints
FALSE_POSITIVETaint analysis flagged but manual review confirms effective sanitization or unreachable code path

Tool Categories

CategoryToolsPurpose
SQL Injectionsqlmap, manual payloadsAutomated and manual SQLi exploitation
Request CraftingBurp Repeater, curlManual HTTP request manipulation
FuzzingBurp Intruder, Turbo IntruderPayload variation and bypass testing
Browser ExploitationPlaywrightXSS demonstration, session hijack
Automationnuclei, custom scriptsTemplate-based vulnerability validation
Evidence CaptureBurp Logger, screenshot toolsRequest/response logging and proof

References

  • references/tools.md - Tool function signatures and parameters
  • references/workflows.md - Exploitation workflows, evidence checklists, and classification tree

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-ctf-binary

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-secrets-exposure

No summary provided by upstream source.

Repository SourceNeeds Review