🛠️ Pentest Checklist
ペネトレーションテストの計画から実行、フォローアップまでを網羅し、脆弱性の効果的な対策を支援するチェックリストを提供するSkill。
📺 まず動画で見る(YouTube)
▶ 【衝撃】最強のAIエージェント「Claude Code」の最新機能・使い方・プログラミングをAIで効率化する超実践術を解説! ↗
※ jpskill.com 編集部が参考用に選んだ動画です。動画の内容と Skill の挙動は厳密には一致しないことがあります。
📜 元の英語説明(参考)
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
🇯🇵 日本人クリエイター向け解説
ペネトレーションテストの計画から実行、フォローアップまでを網羅し、脆弱性の効果的な対策を支援するチェックリストを提供するSkill。
※ jpskill.com 編集部が日本のビジネス現場向けに補足した解説です。Skill本体の挙動とは独立した参考情報です。
⚠️ ダウンロード・利用は自己責任でお願いします。当サイトは内容・動作・安全性について責任を負いません。
🎯 このSkillでできること
下記の説明文を読むと、このSkillがあなたに何をしてくれるかが分かります。Claudeにこの分野の依頼をすると、自動で発動します。
📦 インストール方法 (3ステップ)
- 1. 上の「ダウンロード」ボタンを押して .skill ファイルを取得
- 2. ファイル名の拡張子を .skill から .zip に変えて展開(macは自動展開可)
- 3. 展開してできたフォルダを、ホームフォルダの
.claude/skills/に置く- · macOS / Linux:
~/.claude/skills/ - · Windows:
%USERPROFILE%\.claude\skills\
- · macOS / Linux:
Claude Code を再起動すれば完了。「このSkillを使って…」と話しかけなくても、関連する依頼で自動的に呼び出されます。
詳しい使い方ガイドを見る →- 最終更新
- 2026-05-17
- 取得日時
- 2026-05-17
- 同梱ファイル
- 1
💬 こう話しかけるだけ — サンプルプロンプト
- › Pentest Checklist を使って、最小構成のサンプルコードを示して
- › Pentest Checklist の主な使い方と注意点を教えて
- › Pentest Checklist を既存プロジェクトに組み込む方法を教えて
これをClaude Code に貼るだけで、このSkillが自動発動します。
📖 Claude が読む原文 SKILL.md(中身を展開)
この本文は AI(Claude)が読むための原文(英語または中国語)です。日本語訳は順次追加中。
AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments.
Pentest Checklist
Purpose
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
Inputs/Prerequisites
- Clear business objectives for testing
- Target environment information
- Budget and timeline constraints
- Stakeholder contacts and authorization
- Legal agreements and scope documents
Outputs/Deliverables
- Defined pentest scope and objectives
- Prepared testing environment
- Security monitoring data
- Vulnerability findings report
- Remediation plan and verification
Core Workflow
Phase 1: Scope Definition
Define Objectives
- [ ] Clarify testing purpose - Determine goals (find vulnerabilities, compliance, customer assurance)
- [ ] Validate pentest necessity - Ensure penetration test is the right solution
- [ ] Align outcomes with objectives - Define success criteria
Reference Questions:
- Why are you doing this pentest?
- What specific outcomes do you expect?
- What will you do with the findings?
Know Your Test Types
| Type | Purpose | Scope |
|---|---|---|
| External Pentest | Assess external attack surface | Public-facing systems |
| Internal Pentest | Assess insider threat risk | Internal network |
| Web Application | Find application vulnerabilities | Specific applications |
| Social Engineering | Test human security | Employees, processes |
| Red Team | Full adversary simulation | Entire organization |
Enumerate Likely Threats
- [ ] Identify high-risk areas - Where could damage occur?
- [ ] Assess data sensitivity - What data could be compromised?
- [ ] Review legacy systems - Old systems often have vulnerabilities
- [ ] Map critical assets - Prioritize testing targets
Define Scope
- [ ] List in-scope systems - IPs, domains, applications
- [ ] Define out-of-scope items - Systems to avoid
- [ ] Set testing boundaries - What techniques are allowed?
- [ ] Document exclusions - Third-party systems, production data
Budget Planning
| Factor | Consideration |
|---|---|
| Asset Value | Higher value = higher investment |
| Complexity | More systems = more time |
| Depth Required | Thorough testing costs more |
| Reputation Value | Brand-name firms cost more |
Budget Reality Check:
- Cheap pentests often produce poor results
- Align budget with asset criticality
- Consider ongoing vs. one-time testing
Phase 2: Environment Preparation
Prepare Test Environment
- [ ] Production vs. staging decision - Determine where to test
- [ ] Set testing limits - No DoS on production
- [ ] Schedule testing window - Minimize business impact
- [ ] Create test accounts - Provide appropriate access levels
Environment Options:
Production - Realistic but risky
Staging - Safer but may differ from production
Clone - Ideal but resource-intensive
Run Preliminary Scans
- [ ] Execute vulnerability scanners - Find known issues first
- [ ] Fix obvious vulnerabilities - Don't waste pentest time
- [ ] Document existing issues - Share with testers
Common Pre-Scan Tools:
# Network vulnerability scan
nmap -sV --script vuln TARGET
# Web vulnerability scan
nikto -h http://TARGET
Review Security Policy
- [ ] Verify compliance requirements - GDPR, PCI-DSS, HIPAA
- [ ] Document data handling rules - Sensitive data procedures
- [ ] Confirm legal authorization - Get written permission
Notify Hosting Provider
- [ ] Check provider policies - What testing is allowed?
- [ ] Submit authorization requests - AWS, Azure, GCP requirements
- [ ] Document approvals - Keep records
Cloud Provider Policies:
- AWS: https://aws.amazon.com/security/penetration-testing/
- Azure: https://docs.microsoft.com/security/pentest
- GCP: https://cloud.google.com/security/overview
Freeze Developments
- [ ] Stop deployments during testing - Maintain consistent environment
- [ ] Document current versions - Record system states
- [ ] Avoid critical patches - Unless security emergency
Phase 3: Expertise Selection
Find Qualified Pentesters
- [ ] Seek recommendations - Ask trusted sources
- [ ] Verify credentials - OSCP, GPEN, CEH, CREST
- [ ] Check references - Talk to previous clients
- [ ] Match expertise to scope - Web, network, mobile specialists
Evaluation Criteria:
| Factor | Questions to Ask |
|---|---|
| Experience | Years in field, similar projects |
| Methodology | OWASP, PTES, custom approach |
| Reporting | Sample reports, detail level |
| Communication | Availability, update frequency |
Define Methodology
- [ ] Select testing standard - PTES, OWASP, NIST
- [ ] Determine access level - Black box, gray box, white box
- [ ] Agree on techniques - Manual vs. automated testing
- [ ] Set communication schedule - Updates and escalation
Testing Approaches:
| Type | Access Level | Simulates |
|---|---|---|
| Black Box | No information | External attacker |
| Gray Box | Partial access | Insider with limited access |
| White Box | Full access | Insider/detailed audit |
Define Report Format
- [ ] Review sample reports - Ensure quality meets needs
- [ ] Specify required sections - Executive summary, technical details
- [ ] Request machine-readable output - CSV, XML for tracking
- [ ] Agree on risk ratings - CVSS, custom scale
Report Should Include:
- Executive summary for management
- Technical findings with evidence
- Risk ratings and prioritization
- Remediation recommendations
- Retesting guidance
Phase 4: Monitoring
Implement Security Monitoring
- [ ] Deploy IDS/IPS - Intrusion detection systems
- [ ] Enable logging - Comprehensive audit trails
- [ ] Configure SIEM - Centralized log analysis
- [ ] Set up alerting - Real-time notifications
Monitoring Tools:
# Check security logs
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.log
# Monitor network
tcpdump -i eth0 -w capture.pcap
Configure Logging
- [ ] Centralize logs - Aggregate from all systems
- [ ] Set retention periods - Keep logs for analysis
- [ ] Enable detailed logging - Application and system level
- [ ] Test log collection - Verify all sources working
Key Logs to Monitor:
- Authentication events
- Application errors
- Network connections
- File access
- System changes
Monitor Exception Tools
- [ ] Track error rates - Unusual spikes indicate testing
- [ ] Brief operations team - Distinguish testing from attacks
- [ ] Document baseline - Normal vs. pentest activity
Watch Security Tools
- [ ] Review IDS alerts - Separate pentest from real attacks
- [ ] Monitor WAF logs - Track blocked attempts
- [ ] Check endpoint protection - Antivirus detections
Phase 5: Remediation
Ensure Backups
- [ ] Verify backup integrity - Test restoration
- [ ] Document recovery procedures - Know how to restore
- [ ] Separate backup access - Protect from testing
Reserve Remediation Time
- [ ] Allocate team availability - Post-pentest analysis
- [ ] Schedule fix implementation - Address findings
- [ ] Plan verification testing - Confirm fixes work
Patch During Testing Policy
- [ ] Generally avoid patching - Maintain consistent environment
- [ ] Exception for critical issues - Security emergencies only
- [ ] Communicate changes - Inform pentesters of any changes
Cleanup Procedure
- [ ] Remove test artifacts - Backdoors, scripts, files
- [ ] Delete test accounts - Remove pentester access
- [ ] Restore configurations - Return to original state
- [ ] Verify cleanup complete - Audit all changes
Schedule Next Pentest
- [ ] Determine frequency - Annual, quarterly, after changes
- [ ] Consider continuous testing - Bug bounty, ongoing assessments
- [ ] Budget for future tests - Plan ahead
Testing Frequency Factors:
- Release frequency
- Regulatory requirements
- Risk tolerance
- Past findings severity
Quick Reference
Pre-Pentest Checklist
□ Scope defined and documented
□ Authorization obtained
□ Environment prepared
□ Hosting provider notified
□ Team briefed
□ Monitoring enabled
□ Backups verified
Post-Pentest Checklist
□ Report received and reviewed
□ Findings prioritized
□ Remediation assigned
□ Fixes implemented
□ Verification testing scheduled
□ Environment cleaned up
□ Next test scheduled
Constraints
- Production testing carries inherent risks
- Budget limitations affect thoroughness
- Time constraints may limit coverage
- Tester expertise varies significantly
- Findings become stale quickly
Examples
Example 1: Quick Scope Definition
**Target:** Corporate web application (app.company.com)
**Type:** Gray box web application pentest
**Duration:** 5 business days
**Excluded:** DoS testing, production database access
**Access:** Standard user account provided
Example 2: Monitoring Setup
# Enable comprehensive logging
sudo systemctl restart rsyslog
sudo systemctl restart auditd
# Start packet capture
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &
Troubleshooting
| Issue | Solution |
|---|---|
| Scope creep | Document and require change approval |
| Testing impacts production | Schedule off-hours, use staging |
| Findings disputed | Provide detailed evidence, retest |
| Remediation delayed | Prioritize by risk, set deadlines |
| Budget exceeded | Define clear scope, fixed-price contracts |
When to Use
This skill is applicable to execute the workflow or actions described in the overview.