Checklist
Cannot "GET" /blahblah = TRY DIFFRENT REQUEST METHODS
Extensions to look for : php,aspx,txt,html,config,conf,asp,pdf,zip,tar
/usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
Real and per-existing web application
Narrow down version
Default credentials / bruteforce variations of default creds (run in the background)
Search for existing exploits and CVE's
Don't be afraid to get to page 4 on google
Box built web application
Directory bust the f*** out of it at each level (run the background)
Default credentials / bruteforce variations of default creds (run in the background)
Existing exploits??
Fuzz all input boxes for SQLI, command injection, etc.
File upload features?
Directory traversal, LFI, RFI
Read source code, search for hints/clues
Review requests and responses in Burp
REGARDING ANY AND ALL HTTP PORTS (WINDOWS RPC SPEFICALLY) VISIT ALL OF THEM USING THE IP AND FQDN... Offsec sneaky like that
Last updated