Structured penetration testing workflow with CVSS scoring and OWASP Top 10 coverage
The Penetration Testing skill provides a complete project management framework for ethical hacking engagements. It supports the full lifecycle from project initialization and scoping through finding documentation, CVSS scoring, and final report generation. Findings are tracked with severity ratings, CVE references, NIST control mappings, and actionable remediation guidance. The structured output integrates directly with the Risk Assessment pipeline.
Create a new pen-test project with scope definition and metadata. This establishes the project directory and tracking files.
python3 pentest_manager.py init \
--name 'Q1-2026 Web App Assessment' \
--scope '192.168.1.0/24, webapp.example.com' \
--tester 'Gaby - Regional IT Director'As you discover vulnerabilities during testing, add each finding with severity, CVSS score, CVE reference, and remediation guidance.
python3 pentest_manager.py add-finding \
--project Q1-2026-Web-App \
--title 'SQL Injection in Login Form' \
--severity CRITICAL \
--host 192.168.1.10 --port 443 \
--cvss 9.8 --cve N/A \
--control SI-10 \
--description 'Login form vulnerable to SQL injection via username parameter' \
--remediation 'Implement parameterized queries and input validation'Compile all findings into a structured penetration test report with executive summary, methodology, and detailed findings.
python3 pentest_manager.py report \
--project Q1-2026-Web-App \
--output /reports/pentest_report.mdFeed findings into the consolidated risk register for enterprise-wide risk scoring.
python3 risk_report.py import-findings \
--project my-audit \
--file /reports/pentest_findings.jsonCreate a new penetration testing project with defined scope.
python3 pentest_manager.py init --name 'Web App Pentest' --scope '192.168.1.0/24'Project 'Web App Pentest' initialized Project directory: ./pentest_projects/web-app-pentest/ Scope: 192.168.1.0/24 Status: ACTIVE
# Penetration Test Report
**Project:** Q1-2026 Web App Assessment
**Tester:** Gaby — Regional IT Director
**Date:** 2026-03-01 | **Framework:** NIST SP 800-115
## Executive Summary
5 vulnerabilities identified across the target scope.
- **Critical:** 2 | **High:** 2 | **Medium:** 1
## Finding #1: SQL Injection in Login Form
- **Severity:** CRITICAL | **CVSS:** 9.8
- **Host:** 192.168.1.10:443
- **NIST Control:** SI-10 (Information Input Validation)
- **Description:** The login form at /api/auth/login is vulnerable
to SQL injection via the username parameter.
- **Remediation:** Implement parameterized queries and input validation
- **Evidence:** `' OR 1=1 --` bypasses authentication{
"project": "Q1-2026 Web App Assessment",
"findings": [
{
"id": 1,
"title": "SQL Injection in Login Form",
"severity": "CRITICAL",
"cvss": "9.8",
"host": "192.168.1.10",
"port": "443",
"cve": "N/A",
"nist_control": "SI-10",
"status": "open"
}
]
}Conduct penetration testing on organizational systems at defined frequency.
Monitor and scan for vulnerabilities in organizational systems.
Check the validity of information inputs to the system.
Protect the confidentiality and integrity of transmitted information.
Manage system authenticators by verifying identity before issuing credentials.