PenTest.WS Documentation
  • What is PenTest.WS?
    • Tier Comparison
  • Getting Started
    • Dashboard
    • Creating An Engagement
    • Main Window Layout
    • Engagement Console
    • Import Nmap & Masscan XML
    • Port Scan Templates
    • Adding Hosts Manually
    • Adding Ports to Hosts
    • Capturing Credentials
  • Hosts & Services
    • Host Page
    • Port Page
    • Global Service Notes
    • Service Command Library
    • Default Service Checklist
    • Scratchpad Editor
  • People & Events
    • People Hacking
    • Events Timeline
  • Views & Filtering
    • Boards
    • The Matrix
    • Subnetting
  • User Libraries
    • Shells Library
    • General Command Library
    • General Notes Library
    • Bookmark Library
  • Built-In Tools
    • Echo Up
    • CyberChef
    • Venom Builder
  • Search Capabilities
    • CVE DB
    • Exploit-DB
    • Nmap Scripts
    • Metasploit Modules
    • Keyword Search
  • Findings
    • Findings Admin
    • Findings Library
    • Engagement Findings
  • Clients & Reporting
    • Write-Ups
    • Clients Manager
    • Reporting Templates
    • Generating Deliverables
  • Collaboration
    • User Maintenance
    • Shared Engagements
    • Access Control List
  • Automation & Integration
    • API
    • SMTP
  • Authentication
    • Two-Factor Authentication
    • LDAP Authentication
  • Exporting & Importing
    • Export Account Items
    • Import Account Items
    • Export to CSV / JSON
  • Pro Tier
    • Admin Panel
    • Intranet Mode
    • Solo Mode
    • Large Engagement Support
Powered by GitBook
On this page
  • Single Host Port Scans
  • Subnet Port Scans
  • Creating & Modifying Scan Templates
  • Tier Availability
  1. Getting Started

Port Scan Templates

PreviousImport Nmap & Masscan XMLNextAdding Hosts Manually

Last updated 2 years ago

Example URL: https://pentest.ws/e/{engagement.id}/import

Port Scan Templates are available on the Scan & Import XML page. Scan templates work using copy-and-paste from the web application to your terminal.

  1. Enter a Target IP or Hostname

  2. Click on a template to copy the command to your clipboard

  3. Open a bash or powershell terminal

  4. Paste and execute

Single Host Port Scans

Scan Templates can include variables such as %tip% to insert your Target IP / Hostname.

Level Up!

Do not put your API key directly into templates!

nmap -sC -sV -oA tcp -vv %tip% && curl -X POST "https://pentest.ws/api/v1/e/%eid%/import/nmap" -H  "X-API-KEY: %apikey%" -F "file=@tcp.xml"

Subnet Port Scans

Subnet Port Scans work similar to Single Host Port Scans, with the added field of a DNS Server to resolve hostnames from an IP address range. The Subnet field can be a single IP address (10.1.2.3), an IP range (10.1.2.100-140) or CIDR notation (10.1.2.0/24)

Creating & Modifying Scan Templates

Click the Edit Templates button to enter Change Mode. Here you will be able to create new scan templates or modify existing templates.

Save your changes and click the Use Templates button to exit Change Mode.

Tier Availability

Port Scan Templates are available on all tiers.

Scan a target and automatically import the results into your current Engagement using the . The %apikey% variable will be replaced with your API key once you have confirmed your account password.

PenTest.WS API
Single Host Port Scan Templates
Template Variables
Subnet Port Scan Templates
Modifying A Scan Template