Overview
This guide walks you through conducting your first penetration test with PentAGI. You’ll learn how to create a testing flow, configure targets, monitor execution, and interpret results.Ensure you have completed the Installation and have proper authorization to test the target system.
Prerequisites
Before starting:Step 1: Access PentAGI
Login with credentials
Use the default credentials (change after first login):
- Email:
[email protected] - Password:
admin
Step 2: Create Your First Flow
A “flow” in PentAGI represents a complete penetration testing engagement.Configure flow parameters
Enter the basic information:
- Name: Give your test a descriptive name (e.g., “Web App Security Assessment”)
- Description: Add details about the test scope and objectives
- Target: Specify the target system (e.g.,
http://10.10.10.10:8080)
Step 3: Monitor Execution
PentAGI autonomously executes the penetration test. You can monitor progress in real-time.Understanding the Flow Hierarchy
Flow Components
- Flow
- Tasks
- SubTasks
- Actions
The top-level engagement representing the entire penetration test.Status indicators:
- Active: Test is running
- Completed: All tasks finished
- Failed: Critical error occurred
Real-Time Monitoring
View task progress
The flow interface shows:
- Current task being executed
- Completed tasks (green checkmarks)
- Pending tasks (gray)
- Failed tasks (red X)
Inspect subtask details
Click on any task to expand and view:
- Subtasks and their agents
- Command outputs
- Tool results
- Agent reasoning and decisions
Step 4: Understanding Results
As PentAGI progresses through the test, it discovers and documents findings.Example: SQL Injection Discovery
Here’s how PentAGI identifies and reports a SQL injection vulnerability:Initial testing
Task: “Check sorting functionality for SQL Injection”The executor agent runs sqlmap:
Vulnerability confirmation
Result: SQL injection detected in ‘order’ parameterPentAGI identifies:
- Injection types: Boolean-based blind, Error-based, Time-based blind
- Backend DBMS: MySQL 5.6+
- Example payload:
order=id AND 5670=(SELECT (CASE WHEN (5670=5670) THEN 5670 ELSE (SELECT 9089 UNION SELECT 6214) END))-- silk
Viewing Findings
- In-Flow View
- Summary Report
- Detailed Evidence
Within the flow interface:
- Findings appear under their respective tasks
- Color-coded by severity (red=critical, orange=high, yellow=medium)
- Click to expand full details
Step 5: Exporting Results
Export report
Click the Export button to download:
- Full HTML report
- JSON data for integration
- Markdown summary
Common Testing Scenarios
Web Application Testing
Basic web vulnerability scan
Basic web vulnerability scan
API security assessment
API security assessment
Network infrastructure scan
Network infrastructure scan
Using Professional Tools
PentAGI has access to 20+ professional pentesting tools:sqlmap
Automated SQL injection testing and exploitation
nmap
Network discovery and security auditing
metasploit
Penetration testing framework
commix
Command injection exploitation
nikto
Web server vulnerability scanner
gobuster
Directory and file brute-forcing
Interpreting Agent Decisions
PentAGI uses multiple specialized agents that reason about their actions:Example Agent Reasoning
- Researcher Agent
- Executor Agent
- Developer Agent
Observation: “Application uses GET parameter ‘order’ for sorting”Analysis: “GET parameters are common SQL injection vectors. The sorting functionality directly interacts with database queries.”Decision: “Delegate SQL injection testing to executor agent with sqlmap tool.”
Troubleshooting
Flow stuck on a task
Flow stuck on a task
Possible causes:
- Target system is unreachable
- Firewall blocking tool execution
- Agent waiting for tool to complete
- Check target system connectivity
- Review agent logs for errors
- Consider increasing timeout values
- Pause and manually verify target access
No vulnerabilities found
No vulnerabilities found
Possible causes:
- Target is well-secured
- Testing scope too limited
- Agent needs more specific guidance
- Expand testing prompt with more scenarios
- Provide specific endpoints or features to test
- Use more advanced techniques in prompt
- Try different testing approaches
Tool execution errors
Tool execution errors
Possible causes:
- Tool not available in container
- Invalid tool syntax
- Resource constraints
- Check container has required tools
- Review tool output for syntax errors
- Increase container resources
- Use alternative tools
Next Steps
Custom Assistants
Create specialized testing assistants
Advanced Techniques
Learn advanced pentesting workflows
Best Practices
Security and ethical guidelines
Distributed Setup
Scale testing with worker nodes