Information Gathering
Basic reconnaissance techniques which can help in exploiting the application.
Subdomain Enumeration
sudo wfuzz -c -f output-subdomains.txt -Z -w ~/SecLists/Discovery/DNS/subdomains-top1million-20000.txt --sc 200,202,204,301,302,307,403 http://FUZZ.example.comgobuster vhost -u http://board.htb -w ~/SecLists/Discovery/DNS/subdomains-top1million-20000.txt --append-domainFolder Enumeration
feroxbuster --url http://<IP>:<PORT> -w ~/SecLists/Discovery/Web-Content/raft-medium-directories.txtgobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u IPalso run with -f flag after finishingFile Enumeration
gobuster dir -w ~/SecLists/Discovery/Web-Content/raft-medium-files.txt -u IPgobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u https://10.10.10.60 -k -x php,txt,confGit file
Robots.txt and Sitemap.xml
Software Versions
Sources
Headers
Cookies
Exiftool
Webdav
Public exploits
Last updated