conducting-network-penetration-test

Installation
SKILL.md

Conducting Network Penetration Test

When to Use

  • Assessing the security posture of internal or external network infrastructure before or after deployment
  • Validating firewall rules, network segmentation, and access controls under realistic attack conditions
  • Identifying exploitable vulnerabilities in network services, protocols, and configurations
  • Meeting compliance requirements for PCI-DSS, HIPAA, SOC 2, or ISO 27001 that mandate periodic penetration testing
  • Evaluating the effectiveness of IDS/IPS, SIEM, and SOC detection capabilities against real attack traffic

Do not use for testing networks without explicit written authorization from the asset owner, against production systems without a pre-approved change window and rollback plan, or for denial-of-service testing unless explicitly scoped and authorized.

Prerequisites

  • Signed Rules of Engagement (RoE) document specifying target IP ranges, excluded hosts, testing hours, and emergency contacts
  • Written authorization letter (get-out-of-jail letter) from the network owner
  • Dedicated testing laptop with Kali Linux or equivalent distribution with up-to-date tools
  • VPN or direct network access to the target scope as defined in the RoE
  • Out-of-band communication channel with the client's incident response team
  • Scope document listing in-scope IP ranges, domains, and any explicitly excluded systems (medical devices, SCADA, critical infrastructure)
Related skills
Installs
73
GitHub Stars
6.3K
First Seen
Mar 15, 2026