TCP: HTTP(S) - 80 / 443

NOTE: Remember to update /etc/hosts if there is any redirect issues to target site

NOTE: While waiting for the scan to be completed, do the following

  • Attempt Weak Credentials on any login features found

  • Look for user input fields

  • Look for file upload fields

  • Run through source code of webpages

Interesting Files

robots.txt

sitemap.xml

Directory Enumeration

Wordlists

/usr/share/wordlists/dirb/common.txt
/usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
/usr/share/wordlists/dirb/big.txt
/usr/share/wordlists/dirb/small.txt

GoBuster

  • HTTP - Port 80

The following command brute forces web directories and files against a target IP

The following command brute forces web directories and files against a target IP and trying various file extensions

  • HTTPS - Port 443

The following command brute forces directories and files over HTTPS, ignoring SSL errors, trying multiple file extensions


Dirbuster

The following is a command to run Dirbuster - another alternatives to GoBuster


Fuzz Faster U Fool (FFUF)

The following is a command to brute force directories/files on the target at the root path using FFUF


Vulnerability Scanning

Nmap

The following command scans port 80 and retrieves the HTTP response headers from the web server

The following command scans port 80 and extracts the title of the web page from the HTML response.

The following command scans port 80, detects the service version, and checks for known vulnerabilities (CVEs) against it.


nikto

The following command scans the target web server for common vulnerabilities, misconfigurations, outdated software, and dangerous files using Nikto.


WordPress Scan

NOTE: Look for signs that it is a WordPress site

  • URL paths include "wp-admin", "wp-content", "wp-login.php", "wp-includes"

Determine attack surface

The following command scans the WordPress site to enumerate all installed plugins and all users.

The following command scans the WordPress site to enumerate plugins (p) using aggressive detection methods

Last updated