80, 443 - HTTP/S

Automatic scanners

General purpose automatic scanners:

nikto -h <URL>
whatweb -a 4 <URL>
wapiti -u <URL>
W3af
zaproxy #You can use an API
nuclei -ut && nuclei -target <URL>

Spidering

List of spidering tools:

Directories and Files Enumeration

Tools:

  • Dirsearch (python): It doesn't allow auto-signed certificates but allows recursive search.

  • Gobuster (go): It allows auto-signed certificates, it doesn't have recursive search.

  • Feroxbuster - Fast, supports recursive search.

  • wfuzz wfuzz -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt https://domain.com/api/FUZZ

  • ffuf - Fast: ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://10.10.10.10/FUZZ

  • Chamaleon: It uses wapalyzer to detect used technologies and select the wordlists to use.

Gobuster

Parameters
  • dir: directory brute-forcing mode.

  • -t <n>: number of concurrent threads (default 10).

  • -w <wordlist>: path to the wordlist.

  • -u <URL>: target URL.

Note:

  • Iterate over the results.

  • Include status code 403 (Forbidden Error) and brutefoce these directories.

  • Add more file extensions to search for; In gobuster: -x sh,pl.

Feroxbuster

Dirb

Nikto

Wfuzz

Fuzz parameters using injection payloads:

Wordlists

Included in Kali’s wordlists package under /usr/share/wordlists.

  • /rockyou.txt

  • /dirbuster/directory-list-2.3-medium.txt ( 1.9M - 220560 lines )

  • /dirbuster/directory-list-2.3-small.txt ( 709K - 87664 lines )

  • /dirb/common.txt ( 36K - 4614 lines )

  • /dirb/big.txt ( 180K - 20469 lines )

Last updated

Was this helpful?