Skip to content

Expand Claude Playbook with detailed task guidance and template selection#73

Merged
valITino merged 2 commits intomainfrom
claude/improve-playbook-docs-stjCF
Mar 13, 2026
Merged

Expand Claude Playbook with detailed task guidance and template selection#73
valITino merged 2 commits intomainfrom
claude/improve-playbook-docs-stjCF

Conversation

@valITino
Copy link
Owner

Summary

Enhanced the Claude Playbook documentation with comprehensive task details, improved phase descriptions, and a new template selection guide. This update provides clearer execution guidance for each reconnaissance, scanning, and exploitation phase while adding a decision matrix to help users choose the right assessment template for their use case.

Key Changes

  • Phase 1 (Recon): Converted task list to detailed table with specific instructions for subdomain enumeration, DNS intelligence, WHOIS lookups, OSINT harvesting, certificate transparency, infrastructure mapping, and AI-driven analysis. Added clarification that this phase uses passive techniques only.

  • Phase 2 (Scanning): Enhanced with detailed guidance on high-speed port sweeps, service detection, WAF/CDN detection, NSE vulnerability scripts, exploit module searching, auxiliary scanning, and network traffic capture. Added note that this is the first active phase with packets sent to target.

  • Phase 3A (Enumeration & Vulnerability Discovery): Expanded task descriptions to include technology fingerprinting, web vulnerability scanning, directory/content discovery, HTTP parameter discovery, XSS scanning, SQL injection testing, CMS-specific scanning, API endpoint enumeration, security header analysis, and web reconnaissance agents.

  • Phase 3B (Active Exploitation): Added two new exploitation techniques to the mandatory testing table:

    • Server-Side Template Injection (SSTI) with RCE escalation guidance
    • NoSQL Injection with MongoDB operator testing
  • Post-Exploitation Guidance: Enhanced lateral movement instructions to test credentials against ALL discovered services (SSH, FTP, admin panels, databases, APIs, Redis, MongoDB, MSSQL, PostgreSQL). Improved traffic capture and screenshot documentation requirements with specific guidance on element-level screenshots and annotation.

  • Exploitation Decision Tree: Restructured the vulnerability exploitation flowchart to add a critical safety gate: destructive exploits (data deletion, ransomware, DoS) must be documented as Proof-of-Concept only without live execution, while non-destructive exploits proceed with full exploitation and data extraction.

  • Template Reference: Completely redesigned the template section with:

    • Expanded table showing template name, use case, phases, and key differentiator
    • New "When to Use Which Template" decision matrix with 11 scenario-to-template mappings
    • Detailed descriptions of each template's workflow and capabilities
    • Guidance on scope handling, authentication support, and output formats

Notable Implementation Details

  • All task tables now follow a consistent two-column format (Task | Details) for improved readability
  • Added explicit safety guidance for destructive exploits to prevent accidental data loss
  • Template descriptions include specific feature support (e.g., CIDR ranges, Swagger/OpenAPI, JWT attacks, scope compliance)
  • Decision matrix helps users quickly identify the right template based on target type, engagement phase, and assessment goals

https://claude.ai/code/session_015HDuXoH7ZqS8wiuENg7A8e

claude added 2 commits March 13, 2026 20:16
…afety clause

- Phase 1 (Recon): added specific techniques — DNS record types (A/AAAA/MX/TXT/NS/SOA/SRV),
  infrastructure mapping, CT log lookups, subdomain categorization
- Phase 2 (Scanning): added high-speed port sweep, WAF/CDN detection, NSE scripts,
  service banner collection, traffic capture rationale
- Phase 3A (Enumeration): expanded from 6 generic tasks to 10 specific ones — API endpoint
  enumeration (OWASP API Top 10), security header/SSL analysis, CMS-specific scanning,
  SQL injection testing, web/bug bounty recon
- Phase 3B (Exploitation): added SSTI and NoSQL injection vulnerability classes
- Phase 3C (Post-exploitation): expanded lateral movement to list specific services,
  added element-level screenshots and annotation guidance
- Exploitation Decision Tree: added destructive exploit safety branch — exploits involving
  data deletion, ransomware, disk wipe, or DoS are documented as PoC-only without
  live execution to prevent irreversible damage
- Template reference table: replaced 2-column table with 4-column table (template, use
  case, phases, key differentiator) with detailed descriptions from each template
- Added "When to Use Which Template" decision table mapping 10 common scenarios to
  the recommended template with rationale

https://claude.ai/code/session_015HDuXoH7ZqS8wiuENg7A8e
- Added "Engagement Documentation & Report Storage" section with:
  - Path mapping table for Docker container, host, and local environments
  - Date-stamped engagement folder structure (output/reports/[TARGET]-DDMMYYYY/)
  - Three required documents: final report, engagement log, issues log
  - Storage checklist for end-of-engagement verification
- Created output/ directory structure with subdirectories:
  - output/reports/ — pentest reports (mounted at /root/reports in container)
  - output/sessions/ — session JSON data (mounted at /root/results in container)
  - output/screenshots/ — screenshot evidence (mounted at /tmp/screenshots)
- Updated .gitignore to preserve output/ directory structure (.gitkeep files)
  while still ignoring generated content

https://claude.ai/code/session_015HDuXoH7ZqS8wiuENg7A8e
@valITino valITino marked this pull request as ready for review March 13, 2026 20:57
@valITino valITino merged commit 2ebcddb into main Mar 13, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants