First Security Scan
This guide walks you through running your first security scan with Cyberstrike, from launching the TUI to interpreting results.
🎬 GIF: first-scan.gif
Running first security scan
Launching Cyberstrike
Start Cyberstrike in your target directory:
cd /path/to/targetcyberstrikeThe terminal user interface (TUI) displays:
- Input prompt at the bottom for commands
- Response area in the center for AI output
- Status bar showing model and token usage
Selecting an Agent
Choose a specialized agent for your assessment:
# Web application testingcyberstrike --agent web-application
# Cloud infrastructurecyberstrike --agent cloud-security
# Network penetration testingcyberstrike --agent internal-network
# Bug bounty reconnaissancecyberstrike --agent bug-hunterOr switch agents during a session with /agents.
Basic Reconnaissance
Start with information gathering:
> Perform reconnaissance on example.comThe agent will:
- Enumerate subdomains
- Identify technologies
- Discover endpoints
- Map the attack surface
Web Application Scan
For web application testing:
> Launch the browser and scan https://target.com for vulnerabilitiesThe agent will:
- Launch browser with traffic capture
- Spider the application
- Test for common vulnerabilities
- Report findings with evidence
Example Session
> Navigate to https://target.com/login and test for SQL injection
[Launching browser...][Navigating to login page...][Testing username field...][Testing password field...]
FINDING: SQL Injection━━━━━━━━━━━━━━━━━━━━━━━━WSTG-ID: WSTG-INPV-05Location: POST /api/loginParameter: usernamePayload: admin' OR '1'='1 --Severity: High (CVSS 8.6)Evidence: Response contains SQL error messageQuick Scan Mode
Run a single command without entering interactive mode:
cyberstrike run "scan example.com for open ports and services"With file attachment:
cyberstrike run "analyze this code for vulnerabilities" -f src/auth.tsUnderstanding Output
Finding Format
Cyberstrike reports findings in a structured format:
FINDING: [Vulnerability Name]━━━━━━━━━━━━━━━━━━━━━━━━━━━━WSTG-ID: [Testing Guide Reference]Location: [Where found]Severity: [Critical/High/Medium/Low]CWE: [Weakness Enumeration]Evidence: [Proof of vulnerability]Remediation: [How to fix]Severity Levels
| Level | CVSS | Description |
|---|---|---|
| Critical | 9.0-10.0 | Immediate exploitation risk |
| High | 7.0-8.9 | Significant security impact |
| Medium | 4.0-6.9 | Moderate risk |
| Low | 0.1-3.9 | Minor security concern |
| Info | 0.0 | Informational finding |
Saving Results
Export Session
/shareCreates a shareable link to the session.
Export HAR File
For browser-based testing:
> Export the captured traffic to HAR fileMemory Storage
Save important findings to memory:
> Remember that the target uses PostgreSQL 14.2 on port 5432Common Scan Types
Subdomain Enumeration
> Enumerate all subdomains for target.comPort Scanning
> Scan 10.0.0.0/24 for open portsVulnerability Scanning
> Run nuclei templates against https://target.comAPI Testing
> Test the REST API at https://api.target.com for OWASP Top 10Next Steps
After your first scan:
- Review Security Agents for specialized testing
- Learn about Tools for manual testing
- Configure Permissions for automation
- Set up MCP servers for extended capabilities
Tip
Use /compact to summarize long sessions and continue testing without losing context.