Skip to main content

Common Workflows

Learn the most common scanning patterns and workflows for different use cases.

Quick Network Scan

Discover hosts and identify services:

pentora scan --targets 192.168.1.0/24 --profile standard

Vulnerability Assessment

Full scan with CVE checks:

pentora scan --targets critical-servers.txt --vuln --output report.json

Discovery Only

Identify live hosts without port scanning:

pentora scan --targets 10.0.0.0/16 --only-discover

Resume from Discovery

Scan previously discovered hosts:

# First, discover hosts
pentora scan --targets 10.0.0.0/16 --only-discover

# Then scan discovered hosts
pentora workspace show <scan-id> | jq -r '.discovered_hosts[].ip' > live-hosts.txt
pentora scan --target-file live-hosts.txt --no-discover

Custom Workspace

Use non-default workspace location:

pentora scan --targets 192.168.1.100 --workspace-dir /data/scans

Stateless Scan

No workspace persistence (ephemeral):

pentora scan --targets 192.168.1.100 --no-workspace --output results.json

Remote Execution

Submit scan to remote server:

export PENTORA_SERVER=https://pentora.company.com
export PENTORA_API_TOKEN=your-token-here

pentora scan --targets 192.168.1.0/24 --server $PENTORA_SERVER

Scheduled Scan (Server Mode)

Create recurring scan:

pentora scan --targets 192.168.1.0/24 \
--schedule "0 2 * * *" \
--profile standard \
--notify slack://security-alerts

Requires server running.

Best Practices

1. Use Configuration Files

Avoid long command lines:

# Instead of:
pentora scan --targets 192.168.1.0/24 --rate 5000 --timeout 5s --vuln --profile deep

# Use config file:
pentora scan --targets 192.168.1.0/24 --config deep-scan.yaml

2. Leverage Profiles

Create reusable scan profiles:

# ~/.config/pentora/profiles/production.yaml
scanner:
rate: 500 # Conservative rate for production
profile: standard
vuln: true

fingerprint:
enabled: true

notifications:
channels: [slack://security-prod]
pentora scan --targets production.txt --profile production

3. Separate Discovery and Scanning

For large networks, split phases:

# Phase 1: Fast discovery
pentora scan --targets 10.0.0.0/8 --only-discover -o live-hosts.txt

# Phase 2: Detailed scan of live hosts
pentora scan --target-file live-hosts.txt --no-discover --vuln

4. Use Workspaces for Organization

Separate workspaces per project:

pentora scan --targets client-a.txt --workspace-dir /data/pentora/client-a
pentora scan --targets client-b.txt --workspace-dir /data/pentora/client-b

5. Automate Cleanup

Prevent workspace bloat:

# Weekly cleanup cron job
0 0 * * 0 pentora workspace gc --older-than 30d --quiet