Cheatsheet Summary
Claude is effective at automated discovery and structured testing, but has notable blind spots; its ability to recognize what it missed adds value.
I deployed two virtual machines (VMs) on a local network: Kali Linux with Claude Code installed, and Metasploitable2, an intentionally vulnerable training system. This setup serves as a controlled environment for testing and exploitation.
I initiated a focused test: directing Claude to identify and exploit a specific type of vulnerability.
I provided the following prompt:
Bypassing Cloudflare WAF during security assessments involves handling headers, TLS fingerprinting, IP reputation, and JS challenges; however, the most effective approach is IP whitelisting, with tools like mitmproxy and custom TLS setups covering most remaining cases.
Learn how to use sslscan to identify weak encryption configurations, deprecated SSL/TLS protocols, and potential security issues during web security assessments.
A collection of bug bounty and security testing resources covering common web vulnerabilities, exploitation techniques, reconnaissance methods, and security tools. It includes guides, real-world write-ups, checklists, and tools for testing issues like XSS, SQL injection, SSRF, file uploads, authentication bypasses, cloud misconfigurations, and subdomain enumeration.
No comments yet.
Be the first to share your thoughts
Log in to join the discussion.
Sign In