Validate vulnerability findings through proof-driven exploitation using Shannon's 4-level evidence system. Consumes the exploitation queue from white-box code review, attempts structured exploitation with bypass exhaustion, collects mandatory evidence per vulnerability type, and classifies each finding as EXPLOITED, POTENTIAL, or FALSE_POSITIVE.
Prerequisites
Authorization Requirements
Written authorization
with explicit scope for active exploitation testing
Exploitation queue JSON
from pentest-whitebox-code-review output
Test accounts
at multiple privilege levels for authz testing
Data exfiltration approval
— confirm acceptable proof-of-concept scope
Rollback plan
for any data-mutating exploits
Environment Setup
sqlmap for automated SQL injection exploitation
Burp Suite Professional with Repeater, Intruder, and Turbo Intruder
curl for manual HTTP request crafting
Playwright for browser-based exploitation (XSS, CSRF)
nuclei with custom templates for automated validation
Isolated testing environment or explicit production testing approval
Core Workflow
Queue Intake
Parse exploitation queue JSON, validate schema, prioritize by confidence score and impact severity. Group findings by vulnerability type for parallel exploitation.
Injection Exploitation
Confirm injectable parameter → fingerprint backend (DB type, OS) → enumerate databases/tables → demonstrate data exfiltration with minimal footprint.
XSS Exploitation
Graph traversal from source → processing → sanitization → sink. Craft context-appropriate payload, demonstrate session hijack or DOM manipulation.
Auth Exploitation
Attack authentication weaknesses → demonstrate account takeover via credential stuffing, token forgery, or session hijack.