TCP: HTTP(S) - 80 / 443
NOTE: Remember to update /etc/hosts if there is any redirect issues to target site
NOTE: While waiting for the scan to be completed, do the following
Attempt Weak Credentials on any login features found
Look for user input fields
Look for file upload fields
Run through source code of webpages
Interesting Files
robots.txt
sitemap.xml
Directory Enumeration
GoBuster
HTTP - Port 80
The following command brute forces web directories and files against a target IP
The following command brute forces web directories and files against a target IP and trying various file extensions
The following command brute forces web aggressively of directories and files against the target server and appending common web file extensions
HTTPS - Port 443
The following command brute forces directories and files over HTTPS, ignoring SSL errors, trying multiple file extensions
Dirbuster
The following is a command to run Dirbuster - another alternatives to GoBuster
Fuzz Faster U Fool (FFUF)
The following is a command to brute force directories/files on the target at the root path using FFUF
Vulnerability Scanning
Nmap
The following command scans port 80 and retrieves the HTTP response headers from the web server
The following command scans port 80 and extracts the title of the web page from the HTML response.
The following command scans port 80, detects the service version, and checks for known vulnerabilities (CVEs) against it.
nikto
The following command scans the target web server for common vulnerabilities, misconfigurations, outdated software, and dangerous files using Nikto.
wpscan (Wordpress Sites)
NOTE: Look for signs that it is a WordPress site
URL paths include "wp-admin", "wp-content", "wp-login.php", "wp-includes"
The following command scans the WordPress site to enumerate all installed plugins and all users.
The following command scans the WordPress site to enumerate plugins (p) using aggressive detection methods
Last updated