Recon Workflow Overview¶
Skillz Wiki splits content into two layers:
- Skills teach one tool or capability in a way an agent can reuse directly.
- Recon workflows show how those skills fit into asset discovery and prioritization.
- Exploit paths capture concrete attack chains that are worth replaying in authorized environments.
Default flow¶
- Scope first: confirm the program boundary, exclusions, and safe proof limits.
- Asset expansion: grow the host and service inventory through passive discovery and narrow active probing.
- Surface shaping: identify auth flows, admin panels, APIs, exposed client bundles, and likely trust boundaries.
- Hypothesis selection: turn the highest-value surfaces into a short list of concrete exploit paths.
- Validation: prove the path with minimal-impact, reproducible commands and preserve the output needed to replay it later.
Operating rules¶
- Start with scope, rate limits, and handling constraints.
- Prefer passive collection before active discovery.
- Keep every notable command reproducible and attributable.
- Separate confirmed behavior from inferred risk.
- Stop escalating when the engagement or program rules stop.
Recommended building blocks¶
- Use the DNS Enumeration skill to expand domain scope safely.
- Use the HTTP Probing with httpx skill to turn discovered hosts into a prioritized web surface.
- Use the Nmap Scanning skill to convert hosts into concrete services.
- Use Client-Side Analysis when web applications expose JavaScript-heavy entry points and third-party integrations.