Methodology

Enumerate and discover about target application.

Wordlist:

Terminal window
ffuf -u <target> -w /path/to/wordlist.txt -H "Host: FUZZ.target.com" -fs <size-filter>
Terminal window
host <target>
Terminal window
dnsrecon -d <target>
  • operating system →Server: or Via header, nmap -O -Pn <target>
  • web server ver. → Wappalyzer, curl -I https://<target>
  • frontend → Wappalyzer, view source
  • backend → headers, error messages, files, endpoint, nmap
  • databases → error messages, files
  • robots.txt
  • sitemap.xml
  • .htaccess
  • security.txt
  • browserconfig.xml
  • etc
  • crossdomain.xml
  • .git
  • .env
  • directory enumerations
  • parameter discovery
  • api mapping
  • Fuzz for hidden endpoints, files, parameters, methods, etc
  • Inspect page source
  • Look for sensitive information
  • Links
  • Hardcoded API keys, secrets, credentials