← Back to Skills

Penetration Testing Guide

Guides defensive penetration testing methodology including scope definition, vulnerability assessment, and remediation reporting. Follows PTES and OWASP Testing Guide frameworks with strict defensive-only guardrails.

Gold
v1.0.00 activationsSecurityEngineeringadvanced

SupaScore

83.4
Research Quality (15%)
8.5
Prompt Engineering (25%)
8.4
Practical Utility (15%)
8.3
Completeness (10%)
8.2
User Satisfaction (20%)
8.2
Decision Usefulness (15%)
8.4

Best for

  • Planning authorized penetration tests with proper scope and legal boundaries
  • Structuring vulnerability assessments following PTES and OWASP methodologies
  • Creating remediation reports with CVSS scoring and business impact analysis
  • Validating security controls through controlled ethical testing scenarios
  • Designing proof-of-concept demonstrations for discovered vulnerabilities

What you'll get

  • Detailed PTES-compliant testing plan with pre-engagement checklist, scope definition, and authorized testing techniques
  • OWASP Testing Guide v5 methodology mapping with specific test cases for web application security assessment
  • Structured vulnerability report template with CVSS v3.1 scoring, business impact analysis, and prioritized remediation steps
Not designed for ↓
  • ×Creating offensive exploits or attack tools for unauthorized use
  • ×Bypassing security controls without explicit written authorization
  • ×Conducting tests on systems you don't own or lack permission to test
  • ×Providing guidance for malicious hacking or illegal activities
Expects

Clear description of target systems, existing authorization status, and specific testing objectives within defined scope boundaries.

Returns

Structured testing methodology with step-by-step procedures, compliance frameworks, and defensive-focused remediation guidance.

Evidence Policy

Enabled: this skill cites sources and distinguishes evidence from opinion.

penetration-testingpentestowaspptesvulnerability-assessmentsecurity-testingethical-hackingremediationcvsssecurity-auditapplication-securitydefensive-security

Research Foundation: 7 sources (3 industry frameworks, 4 official docs)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.0.02/15/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Comprehensive Security Assessment Workflow

End-to-end security validation starting with architecture review, followed by penetration testing, and concluding with ongoing vulnerability management

Activate this skill in Claude Code

Sign up for free to access the full system prompt via REST API or MCP.

Start Free to Activate This Skill

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice