Files
AutoPentestX/QUICKSTART.md
gowtham-darkseid 1eda662772 commit
2025-11-30 15:05:59 +05:30

377 lines
12 KiB
Markdown

```
██╗ ██╗ █████╗ ██████╗██╗ ██╗██╗███╗ ██╗ ██████╗
██║ ██║██╔══██╗██╔════╝██║ ██╔╝██║████╗ ██║██╔════╝
███████║███████║██║ █████╔╝ ██║██╔██╗ ██║██║ ███╗
██╔══██║██╔══██║██║ ██╔═██╗ ██║██║╚██╗██║██║ ██║
██║ ██║██║ ██║╚██████╗██║ ██╗██║██║ ╚████║╚██████╔╝
╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝╚═╝ ╚═══╝ ╚═════╝
A U T O P E N T E S T X Q U I C K S T A R T
```
> ⚡ **SYSTEM STATUS**: OPERATIONAL | **SECURITY LEVEL**: MAXIMUM
> 🎯 **MISSION**: Penetrate. Exploit. Dominate.
---
## ⚡ [PHASE 1] DEPLOYMENT SEQUENCE
### [1.1] System Initialization
```bash
# >> ENTERING SYSTEM DIRECTORY...
cd AutoPentestX
# >> EXECUTING DEPLOYMENT PROTOCOL...
chmod +x install.sh
./install.sh
```
**INSTALLER SEQUENCE:**
```
[▓▓▓▓▓▓▓▓▓▓] Installing Nmap, Nikto, SQLMap...
[▓▓▓▓▓▓▓▓▓▓] Configuring Python virtual environment...
[▓▓▓▓▓▓▓▓▓▓] Loading Python dependencies...
[▓▓▓▓▓▓▓▓▓▓] Creating system directories...
[▓▓▓▓▓▓▓▓▓▓] Running system diagnostics...
[✓] DEPLOYMENT COMPLETE
```
## ⚡ [PHASE 2] ATTACK INITIATION
### [2.1] System Activation
```bash
# >> ACTIVATING VIRTUAL ENVIRONMENT...
source venv/bin/activate
# >> LAUNCHING ATTACK VECTOR (authorized targets only)
python3 main.py -t 127.0.0.1
# >> ALTERNATIVE: RAPID DEPLOYMENT
./autopentestx.sh 127.0.0.1
```
```
╔═══════════════════════════════════════════════════════╗
║ [ATTACK STATUS] ║
║ → Target Acquired: 127.0.0.1 ║
║ → Systems: ONLINE ║
║ → Exploit Engine: ARMED ║
║ → Stealth Mode: ACTIVE ║
╚═══════════════════════════════════════════════════════╝
```
## ⚡ [PHASE 3] INTEL EXTRACTION
### [3.1] Access Report Data
```bash
# >> ACCESSING CLASSIFIED REPORTS...
ls -lh reports/
# >> DECRYPTING VULNERABILITY REPORT...
xdg-open reports/AutoPentestX_Report_*.pdf
```
---
## 🎮 [COMMAND ARSENAL]
### [CMD-001] Full Spectrum Attack
```bash
# >> INITIATING COMPLETE PENETRATION SEQUENCE
python3 main.py -t 192.168.1.100
```
### [CMD-002] Rapid Recon Mode
```bash
# >> STEALTH SCAN - WEB PAYLOADS DISABLED
python3 main.py -t 192.168.1.100 --skip-web
```
### [CMD-003] Lightning Strike
```bash
# >> SPEED MODE - RECON ONLY
python3 main.py -t 192.168.1.100 --skip-web --skip-exploit
```
### [CMD-004] Custom Operator ID
```bash
# >> REGISTERING OPERATOR CREDENTIALS
python3 main.py -t 192.168.1.100 -n "Your Name"
```
### [CMD-HELP] System Manual
```bash
# >> ACCESSING SYSTEM DOCUMENTATION
python3 main.py --help
```
---
## 💾 [DATA EXTRACTION COMPLETE]
```
┌─────────────────────────────────────────────────────────┐
│ [CLASSIFIED] - INTELLIGENCE PACKAGE GENERATED │
└─────────────────────────────────────────────────────────┘
```
### [OUTPUT-001] 📄 Vulnerability Dossier (`reports/`)
```
⚠ CLASSIFIED DOCUMENT ⚠
├─ Executive Threat Summary
├─ Vulnerability Database
├─ Risk Matrix Analysis
└─ Remediation Protocols
```
### [OUTPUT-002] 🗄️ Intel Database (`database/`)
```
⚡ PERSISTENT STORAGE ACTIVE
├─ Complete scan data in SQLite
├─ Historical attack patterns
└─ Query interface enabled
```
### [OUTPUT-003] 📊 Operation Logs (`logs/`)
```
📡 REAL-TIME MONITORING
├─ Execution timestamps
├─ System diagnostics
└─ Debug traces
```
### [OUTPUT-004] 💣 Exploit Arsenal (`exploits/`)
```
⚔️ WEAPONIZED PAYLOADS
├─ Metasploit RC scripts
├─ Manual exploitation tools
└─ Attack vector documentation
```
---
## 🚀 [PERFORMANCE OPTIMIZATION]
```
╔══════════════════════════════════════════════════════╗
║ ATTACK SPEED CONFIGURATIONS ║
╚══════════════════════════════════════════════════════╝
```
### [MODE-01] ⚡ LIGHTNING STRIKE (5-10 min)
```bash
# >> RECON ONLY - MAXIMUM SPEED
python3 main.py -t TARGET --skip-web --skip-exploit
```
**STATUS**: Rapid reconnaissance | Minimal footprint
### [MODE-02] 🔥 TACTICAL ASSAULT (10-20 min)
```bash
# >> STANDARD PENETRATION - BALANCED APPROACH
python3 main.py -t TARGET --skip-exploit
```
**STATUS**: Full scan + web vulnerabilities | No exploitation
### [MODE-03] 💥 TOTAL ANNIHILATION (20-30 min)
```bash
# >> FULL SPECTRUM ATTACK - ALL SYSTEMS ENGAGED
python3 main.py -t TARGET
```
**STATUS**: Complete penetration testing | All modules active
---
## ⚠️ [SYSTEM DIAGNOSTICS]
```
┌─────────────────────────────────────────────────┐
│ [ERROR HANDLER] - Common System Failures │
└─────────────────────────────────────────────────┘
```
### [ERROR-001] 🔐 ACCESS DENIED
```bash
# >> ELEVATING PRIVILEGES...
sudo python3 main.py -t TARGET
```
**FIX**: Root access required for deep system penetration
### [ERROR-002] 🔌 MODULE FAILURE
```bash
# >> REACTIVATING VIRTUAL ENVIRONMENT...
source venv/bin/activate
# >> REINSTALLING CORE MODULES...
pip install -r requirements.txt
```
**FIX**: Environment not properly initialized
### [ERROR-003] 🛠️ MISSING WEAPONS
```bash
# >> DOWNLOADING ATTACK TOOLS...
sudo apt-get install nikto sqlmap nmap
```
**FIX**: Essential penetration tools not found
### [ERROR-004] 📄 REPORT GENERATION FAILURE
```bash
# >> REPAIRING DOCUMENT GENERATOR...
pip install --upgrade reportlab pillow
```
**FIX**: PDF library corruption detected
---
## 🎯 [COMPLETE OPERATION SEQUENCE]
```bash
# ┌─────────────────────────────────────────────────────┐
# │ [OPERATION PROTOCOL] - Full Attack Chain │
# └─────────────────────────────────────────────────────┘
# [STEP 1] >> ENTERING SYSTEM...
cd AutoPentestX
# [STEP 2] >> POWERING UP SYSTEMS...
source venv/bin/activate
# [STEP 3] >> LAUNCHING ATTACK SEQUENCE...
python3 main.py -t 192.168.1.100 -n "Security Auditor"
# [STEP 4] >> ATTACK IN PROGRESS...
# ▓▓▓▓▓▓▓░░░ 60% | ETA: 15 minutes
# [SCANNING] [EXPLOITING] [REPORTING]
# [STEP 5] >> EXTRACTING INTELLIGENCE...
ls reports/
sqlite3 database/autopentestx.db
# [STEP 6] >> DECRYPTING REPORT...
xdg-open reports/AutoPentestX_Report_*.pdf
# [STEP 7] >> SHUTTING DOWN SYSTEMS...
deactivate
# [✓] OPERATION COMPLETE - ALL SYSTEMS NOMINAL
```
---
## ⚠️ Important Reminders
### Before Scanning
✅ Obtain written authorization
✅ Document the scope
✅ Verify you have permission
✅ Read DISCLAIMER.md
### During Scanning
✅ Monitor progress
✅ Be aware of network impact
✅ Respect time windows
✅ Keep logs for documentation
### After Scanning
✅ Review the PDF report
✅ Validate findings
✅ Share with authorized parties only
✅ Follow up on remediation
---
## 🎓 Learning Path
### Beginner
1. Run basic scans on local systems
2. Understand the PDF report
3. Learn about common vulnerabilities
4. Practice in lab environments
### Intermediate
1. Customize scan parameters
2. Interpret CVE data
3. Understand risk scoring
4. Use Metasploit RC scripts
### Advanced
1. Integrate with CI/CD pipelines
2. Build custom vulnerability checks
3. Develop exploit modules
4. Contribute to the project
---
## 📞 Need Help?
- 📖 Read the full [README.md](README.md)
- ⚖️ Review [DISCLAIMER.md](DISCLAIMER.md)
- 📋 Check [SAMPLE_OUTPUT.md](SAMPLE_OUTPUT.md)
- 🐛 Open an issue on GitHub
- 💬 Join the community discussions
---
## ⚔️ [SYSTEM ARMED AND READY]
```
╔═══════════════════════════════════════════════════════╗
║ ║
║ ██╗ ██╗ ██████╗ ██╗ ██╗██████╗ ║
║ ╚██╗ ██╔╝██╔═══██╗██║ ██║██╔══██╗ ║
║ ╚████╔╝ ██║ ██║██║ ██║██████╔╝ ║
║ ╚██╔╝ ██║ ██║██║ ██║██╔══██╗ ║
║ ██║ ╚██████╔╝╚██████╔╝██║ ██║ ║
║ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝ ║
║ ║
║ W E A P O N I S N O W O P E R A T I O N A L ║
║ ║
╚═══════════════════════════════════════════════════════╝
```
**⚠️ OPERATOR PROTOCOLS:**
```
[✓] Authorization: MANDATORY before engagement
[✓] Ethics: White-hat operations ONLY
[✓] Knowledge: Continuous learning required
[✓] Responsibility: Handle intel with care
```
> 🎯 **MISSION STATUS**: Ready for deployment
> 💀 **WARNING**: Unauthorized access = Federal crime
> 🔓 **MOTTO**: Hack the planet... legally.
---
## 📟 [QUICK REFERENCE TERMINAL]
```bash
┌──────────────────────────────────────────────────────┐
[CHEAT CODES] - Rapid Command Access │
└──────────────────────────────────────────────────────┘
# >> SYSTEM DEPLOYMENT
./install.sh
# >> LAUNCH ATTACK
python3 main.py -t <target>
# >> ADVANCED OPTIONS
python3 main.py -t <target> -n "Your Name" --skip-web
# >> ACCESS REPORTS
ls reports/
# >> QUERY DATABASE
sqlite3 database/autopentestx.db "SELECT * FROM scans;"
# >> HELP SYSTEM
python3 main.py --help
┌──────────────────────────────────────────────────────┐
[STATUS] System ready | Awaiting orders... │
└──────────────────────────────────────────────────────┘
```