CtrlK
BlogDocsLog inGet started
Tessl Logo

pt-planning-recon

Defines penetration test scope and performs authorized reconnaissance using passive and active methods. Use when planning a test engagement, collecting target intelligence, building asset inventories, or preparing recon findings.

91

1.15x
Quality

87%

Does it follow best practices?

Impact

96%

1.15x

Average score across 3 eval scenarios

SecuritybySnyk

Advisory

Suggest reviewing before use

SKILL.md
Quality
Evals
Security

Pen Test Planning and Reconnaissance

Authorized Use Only

Use this skill only for systems explicitly authorized in writing by the user. If authorization or scope is unclear, pause and ask for confirmation before any target interaction.

Objectives

  1. Define engagement boundaries and success criteria.
  2. Build an asset inventory from approved sources.
  3. Perform passive recon first, then scoped active recon.
  4. Produce recon outputs that feed scanning and exploitation phases.

Workflow

  1. Confirm rules of engagement:
    • In-scope and out-of-scope assets
    • Allowed test windows and rate limits
    • Prohibited actions (DoS, credential stuffing, social engineering, etc.)
  2. Collect passive intelligence:
    • Domains, subdomains, ASN/IP ranges, DNS, mail records, public endpoints
    • Technology stack indicators and externally visible services
  3. Plan active recon in scope:
    • Host discovery and service fingerprinting with safe defaults
    • Logging of every command, timestamp, and target touched
  4. Normalize findings:
    • Deduplicate assets and map to owners/business function when known
    • Tag confidence level and evidence source
  5. Handoff artifacts:
    • Asset inventory for scanning
    • Initial threat hypotheses and likely attack paths

Output Template

Use this structure for recon deliverables:

# Planning and Recon Output

## Scope Summary
- In scope:
- Out of scope:
- Test window:
- Constraints:

## Asset Inventory
- Asset:
  - Type:
  - Exposure:
  - Evidence:

## Recon Findings
- Finding:
  - Evidence:
  - Potential risk:
  - Next step:

## Handoff to Scanning
- Prioritized targets:
- Recommended scan strategy:

Quality Checks

  • Scope constraints are explicit and referenced in findings.
  • No unapproved targets were queried.
  • Evidence is reproducible and timestamped.
  • Findings are prioritized by likely business impact.
Repository
santosomar/ethical-hacking-agent-skills
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.