Enumeration
Mandatory
- Start Burp
- Start ./script/web-enum.sh
- Browse through the page (with Burp)
- Check robots.txt
- Check a 404 page (site /dsoidfsiohfdghfdghfgdiofdiogidgffg)
- Determine and write down each used technology:
- Server
- Application Server
- Languages
- Frameworks
- For all of the previous findings:
- Check if there is a blog post here
- Check for exploits.
- Check for web tech tricks on Hacktricks
- Try a specialized scanner
- Download the exact version of the CMS and look for interesting files.
- Repeat web crawling for all found directories.
Optional
- Check for sequential URLs and try to enumerate other URLs.
- If there are parameters, try change them (maybe also with a small script and a wordlist with usual command parameters)
- See ParamSpider
- Try other wordlists
- Try wordlists with other suffixes
- Try other crawlers (dirb / dirbuster / nikto / …)
- Find exploits for the server
- Check if external sources are embeded (e.g. via a parameter / LFI)
- Make a wordlist with cewl
- Analyze the cookies
- Analyze the local storage
- If you have a domain:
- Try vhost enumeration
- For logins / htauth:
- Search for default passwords
- Typ ’ or ” or — to trigger a possible SQL injection.
- Try usual combinations:
- admin / admin
- admin / password
- guest / guest
- test / test
- admin / 123456
- Brute-force with cewl-based wordlist
- Brute-force with general wordlists
- Set another Host header
- Set proxy header
- Try other tips from the Hacktricks list
- Perform a general vulnerability scan:
- Nmap NSE
- Metasploit exploit_suggester
- OpenVAS
- Nessus
- For forms:
- Make a pseudo-normal request which is recorded in Burp
- Perform requests with the following:
- ’
- ”
- Extrem long input data
- Escaping characters for the used technology (e.g. <% %> {{ }} …)
- Store the request in a file and execute
sqlmap -v 4 -r /tmp/request.
- For file uploads:
- You have many text to look through / parse? See the grepable strings page.
Leave a Reply
You must be logged in to post a comment.