The strategy "Conducting Pentesting" emphasizes employing diverse tools for a thorough penetration test on networks or applications. It involves various techniques like network scanning and mapping, identifying and exploiting vulnerabilities, and performing password cracking alongside social engineering tests. For instance, using nmap aids in identifying open ports and services, while Goby and Sublist3r expose potential risks and expand the target surface.
Next, tools like Nikto and Metasploit are pivotal in discovering and exploiting vulnerabilities. Nikto examines web servers for outdated software, whereas Metasploit exploits known vulnerabilities. Moreover, platforms like Hydra and John the Ripper enable the testing of password strength through brute-force attacks, supporting the broader strategy of social engineering tests.
The strategies
⛳️ Strategy 1: Perform Network Scanning and Mapping
- Utilise nmap to perform comprehensive network scanning to identify open ports and services
- Use Goby for vulnerability scanning and asset exposure to map potential risks
- Deploy Sublist3r to enumerate subdomains for a given domain to expand target surface
- Leverage Shodan to gather information on devices exposed to the internet
- Utilise Censys to search for known hosts and gain insight into exposed services
- Employ Amass to perform in-depth network recon and mapping
- Use Recon-ng to enrich standard reconnaissance processes with additional data
- Conduct vulnerability scanning with OpenVAS to identify system weaknesses
- Map application structure with OWASP ZAP Proxy for web applications scanning
- Incorporate Burp Suite for further application testing and proxy interception
⛳️ Strategy 2: Identify and Exploit Vulnerabilities
- Use Nikto for scanning web servers to find outdated software and dangerous files
- Deploy WPScan to identify vulnerabilities in WordPress installations
- Execute sqlmap to detect and exploit SQL injection flaws in applications
- Use Metasploit Framework to identify and exploit known vulnerabilities
- Leverage Empire for post-exploitation adversary simulation
- Utilise XSStrike to detect and exploit XSS vulnerabilities
- Employ sqlmap for blind SQL injection in various databases
- Utilise OWASP ZAP Proxy for automated scanners to identify vulnerabilities
- Leverage Burp Suite’s intruder tool to automate customised payload exploitation
- Utilise Responder for exploiting core Windows Name Resolution Services
⛳️ Strategy 3: Perform Password Cracking and Social Engineering Tests
- Use Hydra for fast network logon cracker supporting many protocols
- Deploy John the Ripper to identify weak passwords via offline password cracking
- Utilise Metasploit for capturing and cracking credentials
- Test password strength by implementing brute-force attacks with Hydra
- Leverage Burp Suite for testing social login features in applications
- Utilise John the Ripper in dictionary mode to crack simple password hashes
- Incorporate social engineering toolkit for phishing and credential harvesting tests
- Utilise Empire for capturing and relaying credentials in a networked environment
- Attempt dictionary attacks using Hydra against weak password setups
- Combine password cracking tools with breached password databases for effectiveness
Bringing accountability to your strategy
It's one thing to have a plan, it's another to stick to it. We hope that the examples above will help you get started with your own strategy, but we also know that it's easy to get lost in the day-to-day effort.
That's why we built Tability: to help you track your progress, keep your team aligned, and make sure you're always moving in the right direction.

Give it a try and see how it can help you bring accountability to your strategy.
