Configuration Settings
AutoPentestX uses a centralizedconfig.json file to manage all tool settings, scanning parameters, and behavior options. This file is located in the root directory of the application.
Configuration File Location
Application Metadata
Application name displayed in reports and output
Current version of AutoPentestX
Application description for documentation and reports
Scan Settings
Core scanning behavior and network reconnaissance parameters.Enable safe mode by default to prevent aggressive scanning
Scan timeout in seconds (5 minutes)
Maximum port range to scan (1-65535)
Scan Techniques
Enable TCP port scanning
Enable UDP port scanning
Enable service version detection
Enable operating system fingerprinting
Enable detailed version detection for services
Vulnerability Scanning
Settings for web vulnerability scanners (Nikto, SQLMap).Enable Nikto web server scanner
Enable SQLMap for SQL injection testing
Nikto scan timeout in seconds
SQLMap scan timeout in seconds
Maximum depth for web crawling during vulnerability assessment
CVE Lookup
Configuration for CVE (Common Vulnerabilities and Exposures) database queries.Enable automatic CVE lookups for detected services
Primary CVE API endpoint
NIST National Vulnerability Database API endpoint
Maximum number of CVE results to retrieve per service
Cache CVE results to improve performance on repeated scans
Exploitation Settings
Controls for exploit simulation and Metasploit integration.Enable safe mode for exploitation (simulation only)
Enable Metasploit Framework integration
Maximum number of exploit attempts per vulnerability
Generate Metasploit resource scripts for manual exploitation
Risk Scoring
Risk assessment thresholds and weighting factors.CVSS Thresholds
Minimum CVSS score for CRITICAL severity (9.0-10.0)
Minimum CVSS score for HIGH severity (7.0-8.9)
Minimum CVSS score for MEDIUM severity (4.0-6.9)
Minimum CVSS score for LOW severity (0.1-3.9)
Weight Factors
Risk multiplier for exploitable vulnerabilities (2x)
Risk multiplier when public exploits exist (1.5x)
Risk multiplier for network-accessible services (1.3x)
Risk reducer for vulnerabilities requiring authentication (0.7x)
Reporting
Report generation settings and output formats.Default report format (pdf, html, json)
Generate JSON output alongside PDF report
Include screenshots in reports (requires additional tools)
Add “CONFIDENTIAL” watermark to PDF reports
Default tester name for reports (can be overridden with
-n flag)Database Configuration
Database type (currently only SQLite is supported)
Path to SQLite database file
Enable automatic database backups
Number of days to retain scan data before cleanup
See Database Configuration for detailed schema information.
Logging
Application logging configuration.Enable application logging
Log level: DEBUG, INFO, WARNING, ERROR, CRITICAL
Directory for log files
Maximum log file size in megabytes before rotation
Number of rotated log files to keep
Output Directories
Default directories for various output types.Directory for generated reports
Directory for application logs
Directory for database files
Directory for generated exploit scripts
Network Settings
HTTP client configuration for web requests.User-Agent header for HTTP requests
HTTP request timeout in seconds
Maximum number of retries for failed requests
Delay in seconds between requests to avoid rate limiting
Example Configuration
Modifying Configuration
- Edit the
config.jsonfile in the root directory - Validate JSON syntax before saving
- Restart AutoPentestX for changes to take effect
Related Resources
- Scan Options - CLI flags and runtime options
- Database Configuration - Database schema and queries
- Quick Start Guide - Get started with AutoPentestX