Scan Options
AutoPentestX provides several command-line options to customize scan behavior and control which phases execute during a penetration test.Basic Usage
Required Arguments
Target IP address or domain name to scanExamples:
192.168.1.100example.com10.0.0.1
Optional Arguments
Tester Information
Name of the penetration tester to include in reportsExample:
Safety Controls
Disable safe mode to allow actual exploitation attemptsDefault behavior:
- Safe mode: ENABLED (exploitation is simulated only)
- With
--no-safe-mode: Actual exploitation attempts may be performed
Scan Phase Controls
Skip web vulnerability scanning (Nikto and SQLMap)Use this flag to save time when:
- Target has no web services
- Web scanning is not in scope
- Quick reconnaissance scan needed
- Nikto web server scanner
- SQLMap SQL injection testing
- Web crawling and analysis
Skip exploitation assessment phaseUse this flag when:
- Only reconnaissance and vulnerability assessment needed
- Client agreement prohibits exploitation attempts
- Time-constrained scanning
- Exploit matching
- Metasploit integration
- Exploitation simulation
- RC script generation
Version Information
Display AutoPentestX version and exitExample:
Show help message with all available options and examplesExample:
Scan Phases
AutoPentestX executes the following phases during a full assessment:Phase 1: Database Initialization
- Creates scan record in database
- Assigns unique mission ID
- Status: ACTIVE
Phase 2: Network Reconnaissance
- Port scanning (TCP/UDP)
- Service detection
- OS fingerprinting
- Version detection
Phase 3: Vulnerability Analysis
- Nikto web server scanning (unless
--skip-web) - SQLMap SQL injection testing (unless
--skip-web) - Web crawling and analysis
Phase 4: CVE Intelligence
- CVE lookup for detected services
- CVSS scoring
- Exploit availability check
Phase 5: Risk Assessment
- CVSS threshold analysis
- Risk score calculation
- Severity classification
- Overall risk level determination
Phase 6: Exploitation Assessment
- Exploit matching (unless
--skip-exploit) - Safe mode simulation by default
- Metasploit resource script generation
Phase 7: Report Generation
- PDF report creation
- JSON data export
- Database updates
- Final summary display
Usage Examples
Authorization Requirements
When you run AutoPentestX, you will see a legal warning and authorization prompt:yes or y to proceed with the scan.
Default Values Summary
| Option | Default Value | Description |
|---|---|---|
--target | Required | Target IP or domain |
--tester-name | AutoPentestX Team | Tester name in reports |
| Safe Mode | Enabled | Prevents actual exploitation |
| Web Scanning | Enabled | Can disable with --skip-web |
| Exploitation | Enabled | Can disable with --skip-exploit |
Configuration File
CLI flags override configuration file settings. For persistent configuration changes, edit
config.json.- Scan timeouts
- Port ranges
- CVE API endpoints
- Risk scoring thresholds
- Output directories
Output Locations
Scan results are stored in multiple locations:| Output Type | Default Location | Description |
|---|---|---|
| PDF Reports | reports/ | Generated penetration test reports |
| Database | database/autopentestx.db | SQLite database with scan data |
| Logs | logs/ | Application logs and debug info |
| Exploits | exploits/ | Generated Metasploit RC scripts |
Performance Considerations
Scan Duration Factors
- Number of open ports: More services = longer scan time
- Web vulnerability scanning: Nikto and SQLMap can be time-intensive
- Network latency: Remote targets take longer than local networks
- CVE lookup: Dependent on API response times
Time-Saving Options
Error Handling
AutoPentestX gracefully handles:- Invalid targets: DNS resolution failures
- Network errors: Timeouts and connection issues
- Interrupted scans: Ctrl+C saves partial results
- Permission errors: Missing root/admin privileges
Interrupted scans are marked with status
interrupted in the database and can be reviewed later.Related Resources
- Configuration Settings - Edit config.json defaults
- Database Configuration - View scan results in database
- Quick Start Guide - Run your first scan