Skip to content

Quick Start

The shortest useful path

Use this flow when you want to start a new engagement quickly.

  1. Create a session and define the target IP or host.
  2. Import Nmap XML results, or stage them in Infrastructure Hub for review.
  3. Build the attack graph with nodes, status, notes, and tags.
  4. Use Arsenal suggestions from the selected node to accelerate recon and exploitation.
  5. Capture findings and evidence while you work.
  6. Write the report in Markdown and export when ready.
  7. Export the session as .ptpx for backup or transfer.

1. Start with scope

Fill in the target field and session notes before adding graph nodes. That gives the Arsenal and the reporting workflow a consistent source of context.

2. Build from imports

If you already have Nmap output, import it early. Infrastructure Hub is useful when you want to review hosts and services before pushing them into the graph.

3. Keep evidence attached to the work

Use findings and evidence during the engagement instead of writing everything at the end. PentestPath is designed to keep graph, terminal, notes, and reporting aligned.

Continue reading

PentestPath documentation