// WHY MINDSET MATTERS MORE THAN TOOLS
- Tools only find what they are designed to find. Your brain finds the rest.
- A $500 Burp Pro license means nothing without a systematic testing approach.
- Every professional pentest is 70% thinking, 30% execution.
- The best vulnerability you find will always be one no scanner detected.
Core Principles Every Pentester Must Follow
- Think like an attacker, report like a defender. Your job has two phases — break things AND explain how to fix them clearly.
- Every input is a potential vulnerability. URL params, POST body, HTTP headers, cookies, file uploads, JSON keys, GraphQL variables — everything gets tested.
- Low and slow beats fast and loud. Understand impact before exploiting. Crashing production is never acceptable.
- Document everything in real time. Screenshots, full request/response pairs, timestamps. Memory fades fast.
- Never assume, always verify. Confirm every finding manually — automated tool false positives waste client trust.
- Chain vulnerabilities. A P3 + P3 + P3 chain is often a P1. Think about what an attacker does after the first step.
- Know when to stop. If you accidentally access sensitive PII you didn't need — stop, document, report immediately.
- Stay in scope. One wrong click on an out-of-scope asset can have legal consequences. Re-read the RoE every morning.
The Attacker's Mental Model — Ask These Every Time
| Question | What You're Looking For |
| What does this feature do? | Understand intended behavior before breaking it |
| What data does it accept? | Identify all input surfaces — visible and hidden |
| What does the server do with my input? | Is it stored? Reflected? Passed to a DB/OS/XML parser? |
| What checks are in place? | Client-side only? Server-side? Regex? Whitelist or blacklist? |
| What happens if I send unexpected data? | Error messages, different behavior, time delays — all signals |
| Who else can see this data? | Stored XSS impact depends on who views injected content |
| What's the worst case if vulnerable? | Helps assign correct severity — RCE vs info disclosure |
Professional Pentest Lifecycle
OWASP Testing Guide — Your Bible
- Follow the OTG test case IDs — reference them in your report (e.g., OTG-AUTHN-001)
- Use the OWASP Web Security Testing Guide (WSTG) checklist for each engagement
- Map findings to CWE IDs (Common Weakness Enumeration) for developer clarity
- Score all findings with CVSS 3.1 — standard for all enterprise clients
// PRO TIPThe best pentesters read source code, not just test forms. If you have access to JS bundles, decompiled APKs, or leaked source — review it. Logic bugs and hardcoded secrets live there.