Your First Scan
This guide will walk you through running your first security assessment with AutoPentestX.Quick Start Sequence
Activate Virtual Environment
Activate the Python virtual environment:You should see
(venv) in your terminal prompt.Launch Your First Scan
Run a basic scan on localhost (safe for testing):This performs a quick reconnaissance scan without web testing or exploitation.
Command Reference
Basic Usage
Essential Options
| Option | Description | Example |
|---|---|---|
-t, --target | Target IP or domain (required) | -t 192.168.1.100 |
-n, --tester-name | Your name for the report | -n "John Doe" |
--skip-web | Skip Nikto and SQLMap scans | --skip-web |
--skip-exploit | Skip exploitation phase | --skip-exploit |
--no-safe-mode | Disable safety protections | --no-safe-mode |
--help | Show help message | --help |
--version | Show version info | --version |
Common Scanning Scenarios
Scan Modes Explained
Mode 1: Lightning Strike (5-10 min)
Use case: Quick reconnaissance for initial assessmentPerforms: Port scanning, service detection, OS fingerprinting
Skips: Web testing, SQL injection, exploitation
Best for: Rapid network mapping, time-sensitive assessments
Skips: Web testing, SQL injection, exploitation
Best for: Rapid network mapping, time-sensitive assessments
Mode 2: Tactical Assault (10-20 min)
Use case: Standard vulnerability assessment without exploitationPerforms: Full network scan, Nikto web testing, SQLMap injection testing, CVE lookup
Skips: Exploit simulation
Best for: Vulnerability discovery, compliance scanning
Skips: Exploit simulation
Best for: Vulnerability discovery, compliance scanning
Mode 3: Total Assessment (20-30+ min)
Use case: Complete penetration test with exploit matchingPerforms: All scanning + Metasploit exploit matching and RC script generation
Skips: Nothing (full assessment)
Best for: Comprehensive security audits, red team exercises
Skips: Nothing (full assessment)
Best for: Comprehensive security audits, red team exercises
Understanding the Output
AutoPentestX creates multiple outputs during each scan:Console Output
The tool displays real-time progress through 7 phases:Final Summary
When complete, you’ll see a mission summary:Generated Files
PDF Report
Location:
reports/AutoPentestX_Report_<timestamp>.pdfProfessional report with:- Executive summary
- Vulnerability details
- Risk assessment
- Remediation steps
SQLite Database
Location:
database/autopentestx.dbComplete scan data:- Scan history
- Port information
- Vulnerability records
- Exploit attempts
Execution Logs
Location:
logs/Detailed logs:- Scan timestamps
- Tool output
- Error messages
- Debug traces
Exploit Scripts
Location:
exploits/Metasploit RC files:- Matched exploits
- Attack vectors
- Manual testing scripts
Accessing Report Data
View PDF Report
Query Database
Check Logs
Example Workflow
Here’s a complete operation from start to finish:Monitor Progress
Watch the 7 phases execute:
- Phase 1: Initialization
- Phase 2: Network Reconnaissance
- Phase 3: Vulnerability Analysis
- Phase 4: CVE Intelligence
- Phase 5: Risk Assessment
- Phase 6: Exploit Simulation
- Phase 7: Report Generation
Troubleshooting
Permission Errors
Many scanning operations require root privileges:Virtual Environment Not Activated
If you see module import errors:Missing Tools
If Nmap, Nikto, or SQLMap are not found:Report Generation Failed
If PDF generation fails:Metasploit Errors
If you see Metasploit-related errors:Best Practices
Before Scanning
✅ Obtain written authorization
✅ Document the scope
✅ Verify target IP/domain
✅ Read legal disclaimers
✅ Document the scope
✅ Verify target IP/domain
✅ Read legal disclaimers
During Scanning
✅ Monitor progress
✅ Be aware of network impact
✅ Respect time windows
✅ Keep logs for documentation
✅ Be aware of network impact
✅ Respect time windows
✅ Keep logs for documentation
After Scanning
✅ Review PDF report thoroughly
✅ Validate findings
✅ Share with authorized parties only
✅ Follow up on remediation
✅ Validate findings
✅ Share with authorized parties only
✅ Follow up on remediation
Security
✅ Store reports securely
✅ Don’t share credentials
✅ Use safe mode by default
✅ Report responsibly
✅ Don’t share credentials
✅ Use safe mode by default
✅ Report responsibly
Quick Reference Cheatsheet
Next Steps
Advanced Configuration
Learn about custom scan profiles and advanced options
Interpreting Results
Understand risk scores, CVSS ratings, and remediation priorities
Metasploit Integration
Use generated RC scripts for manual exploitation testing
CI/CD Integration
Automate security testing in your development pipeline