80, 443
Checklist
View SSL certificates for usernames
View Source code
Check /robots.txt, .htaccess, .htpasswd
Check HTTP Request
Run Burp Spider
View Console
Use Nikto
Check OPTIONS
HTTP PUT / POST File upload
Parameter fuzzing with wfuzz
Browser response vs Burp response
Shell shock (cgi-bin/status)
Cewl wordlist and directory bruteforce
nmap --script http-enum 192.168.10.55Apache version exploit & other base server exploits
Port 443 :
nmap -Pn -sV --script ssl* -p 443 10.10.10.60 -A -T5
Heartbleed (
sslyze --heartbleed <ip>)Heartbleed exploit code (https://gist.github.com/eelsivart/10174134)
Shellshock
Poodle
IIS :
Try changing file.asp file to file.asp.txt to reveal the source code of the files
Apache :
Shell shock (https://www.exploit-db.com/exploits/34900)
OpenFuck (https://github.com/exploit-inters/OpenFuck)
Directory Enumeration
Apache : x -> php, asp, txt, xml, bak
IIS : x-> asp, aspx, txt, ini, tmp, bak, old
Gobuster quick directory busting
Gobuster search with file extension
Gobuster comprehensive directory busting
gobuster dir -t 100 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x txt,php,csv,md,json,js,html,py,sh -k -u http://10.10.10.x-k (ignore ssl verification)
-x specific extension
Dirbuster
Change wordlists (Wfuzz, dirb)
Custom directory enumeration (HTB Obscurity)
wfuzz -c -z file,common.txt -u http://10.10.10.168:8080/FUZZ/SuperSecureServer.py
Parameter Fuzzing
WFUZZ
hc - status code to ignore
hw - word length to ignore
hh - char length to ignore
hl - line length to ignore
Wordpress
Wpscan
Metasploit
Username Enumeration via BruteforceSecurityCompass/wordpress-scriptsContribute to SecurityCompass/wordpress-scripts development by creating an account on GitHub.github.com
python wp_brute.py -t http://10.10 -u usernames.txt
Last updated
Was this helpful?