Recon and Methodology Router
This is the starting router for new targets and unknown attack surfaces.
When to Use
- You just received a new target and do not yet know what to test first
- You need to begin with asset discovery, tech fingerprinting, endpoint inventory, and test-route planning
- You want to build follow-up testing on structured methodology instead of random payload enumeration
Skill Map
- Recon and Methodology
- Insecure Source Code Management — .git/.svn/.hg exposure detection
- Dependency Confusion — Supply chain reconnaissance for internal package names
Recommended Flow
- First confirm in-scope assets and target type
- Then perform asset discovery, port/service identification, technology fingerprinting, and endpoint collection
- Route based on collected findings to api-sec, auth-sec, injection-checking, or business-logic-vuln