githubEdit

80, 443 - HTTP/S

Automatic scanners

General purpose automatic scanners:

nikto -h <URL>
whatweb -a 4 <URL>
wapiti -u <URL>
W3af
zaproxy #You can use an API
nuclei -ut && nuclei -target <URL>

Spidering

List of spidering tools:

Directories and Files Enumeration

Tools:

Gobuster

chevron-rightParametershashtag
  • dir: directory brute-forcing mode.

  • -t <n>: number of concurrent threads (default 10).

  • -w <wordlist>: path to the wordlist.

  • -u <URL>: target URL.

circle-info

Note:

  • Iterate over the results.

  • Include status code 403 (Forbidden Error) and brutefoce these directories.

  • Add more file extensions to search for; In gobuster: -x sh,pl.

Feroxbuster

Dirb

Nikto

Wfuzz

Fuzz parameters using injection payloads:

Wordlists

Included in Kali’s wordlists package under /usr/share/wordlists.

  • /rockyou.txt

  • /dirbuster/directory-list-2.3-medium.txt ( 1.9M - 220560 lines )

  • /dirbuster/directory-list-2.3-small.txt ( 709K - 87664 lines )

  • /dirb/common.txt ( 36K - 4614 lines )

  • /dirb/big.txt ( 180K - 20469 lines )

Last updated