HTTP
nmap -p80,443,8080,8000 \
--script http-title,http-headers,http-enum,http-methods,http-robots.txt \
--script-args http-methods.test-all=true \
-oA http_meta $ip
gobuster dir -u http://$domain/ \
-w /usr/share/seclists/Discovery/Web-Content/common.txt \
-t 50 -o gb_common.txt
ffuf -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt \
-u http://10.10.10.123/FUZZ -mc 200,204,301,302,307 -t 50 -of csv -o ffuf.csv
dirsearch -u http://10.10.10.123 -e php,html,js,txt -r -t 40 -o dirsearch.txt
http login bruteforce
Last updated