Skip to content
Discussion options

You must be logged in to vote

Great question - responsible use is critical.

Before Any Testing:

  1. Get written authorization (scope document / rules of engagement)
  2. Define target IP ranges explicitly
  3. Agree on testing windows with the client
  4. Set up a dedicated testing network/VPN
  5. Document everything from the start

During Testing:

  • Only target systems in scope
  • Stop immediately if you hit out-of-scope systems
  • Use the --safe flag to avoid destructive payloads
  • Log all commands and outputs
  • Take screenshots of findings
  • Do NOT exfiltrate real user data

After Testing:

  • Clean up any artifacts/shells left behind
  • Write a detailed report with CVSS scores
  • Provide remediation guidance for each finding
  • Securely delete any captured data

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by bad-antics
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant