First Security Scan
This guide walks you through running your first security scan with Cyberstrike, from launching the TUI to interpreting results.
π¬ GIF: first-scan.gif
Running first security scan
Launching Cyberstrike
Start Cyberstrike in your target directory:
cd /path/to/targetcyberstrikeThe terminal user interface (TUI) displays:
- Input prompt at the bottom for commands
- Response area in the center for AI output
- Status bar showing model and token usage
Selecting an Agent
Choose a specialized agent for your assessment:
# Web application testingcyberstrike --agent web-application
# Cloud infrastructurecyberstrike --agent cloud-security
# Network penetration testingcyberstrike --agent internal-network
# Bug bounty reconnaissancecyberstrike --agent bug-hunterOr switch agents during a session with /agents.
Basic Reconnaissance
Start with information gathering:
> Perform reconnaissance on example.comThe agent will:
- Enumerate subdomains
- Identify technologies
- Discover endpoints
- Map the attack surface
Web Application Scan
For web application testing:
> Launch the browser and scan https://target.com for vulnerabilitiesThe agent will:
- Launch browser with traffic capture
- Spider the application
- Test for common vulnerabilities
- Report findings with evidence
Example Session
> Navigate to https://target.com/login and test for SQL injection
[Launching browser...][Navigating to login page...][Testing username field...][Testing password field...]
FINDING: SQL InjectionββββββββββββββββββββββββWSTG-ID: WSTG-INPV-05Location: POST /api/loginParameter: usernamePayload: admin' OR '1'='1 --Severity: High (CVSS 8.6)Evidence: Response contains SQL error messageQuick Scan Mode
Run a single command without entering interactive mode:
cyberstrike run "scan example.com for open ports and services"With file attachment:
cyberstrike run "analyze this code for vulnerabilities" -f src/auth.tsUnderstanding Output
Finding Format
When a vulnerability is recorded for a session, it uses the following fields (matching the agentβs report_vulnerability input and the stored session record):
Required
titleβ Short name of the findingseverityβ One of:critical,high,medium,low,infodescriptionβ Detailed explanation of the finding
Optional
idβ Assigned when the finding is persisted in a sessioncwe_idβ CWE identifier when applicable (e.g.CWE-79)fileβ Path to the affected fileline_start/line_endβ Line range in that filesteps_to_reproduceβ Numbered steps to reproducepocβ Proof of concept (steps, request, or description)business_impactβ Impact on the businessrecommendationβ Fix or mitigation guidancestatusβopen,fixed, orignored(defaultopen)message_idβ Link to the chat message that reported the finding, when settimeβcreatedandupdatedtimestamps (milliseconds), when persisted
Example layout (illustrative):
FINDING: [title]ββββββββββββββββββββββββββββSeverity: [critical | high | medium | low | info]Description: [description]CWE ID: [cwe_id, optional]File: [file, optional]Lines: [line_startβline_end, optional]Steps to reproduce: [steps_to_reproduce, optional]Proof of concept: [poc, optional]Business impact: [business_impact, optional]Recommendation: [recommendation, optional]Status: [open | fixed | ignored]Severity Levels
| Level | CVSS | Description |
|---|---|---|
| Critical | 9.0-10.0 | Immediate exploitation risk |
| High | 7.0-8.9 | Significant security impact |
| Medium | 4.0-6.9 | Moderate risk |
| Low | 0.1-3.9 | Minor security concern |
| Info | 0.0 | Informational finding |
Saving Results
Export Session
/shareCreates a shareable link to the session.
Export HAR File
For browser-based testing:
> Export the captured traffic to HAR fileMemory Storage
Save important findings to memory:
> Remember that the target uses PostgreSQL 14.2 on port 5432Common Scan Types
Subdomain Enumeration
> Enumerate all subdomains for target.comPort Scanning
> Scan 10.0.0.0/24 for open portsVulnerability Scanning
> Run nuclei templates against https://target.comAPI Testing
> Test the REST API at https://api.target.com for OWASP Top 10Next Steps
After your first scan:
- Review Security Agents for specialized testing
- Learn about Tools for manual testing
- Configure Permissions for automation
- Set up MCP servers for extended capabilities
Tip
Use /compact to summarize long sessions and continue testing without losing context.