Enumeration

Burpsuite

amass enum -passive -d dfwairport.com -o results.txt

sublist3r -d dfwairport.com

./scripts/ct.py example.com | ./bin/massdns -r ./lists/resolvers.txt -o S -w results.txt

true | openssl s_client -connect dfwairport.com:443 2>/dev/null | openssl x509 -noout -text | perl -l -0777 -ne '@names=/\bDNS:([^\s,]+)/g; print join("\n", sort @names);'

Grep domain names only

grep -oE '[a-zA-Z0-9.-]+\.com' <file_name>

Grep IP addresses only grep -oE '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+' <file_name>

Unique items by count and descending order sort <file_name> | uniq -c | sort -nr

Remove duplicates

sort <file_name> | uniq > <output_file>

BugBounty/webapp/mobile app

Web app handbook

Real world bug hunting

Owasp testing guide

Bugbounty bootcamp

The hackers playbook 3

Breaking into information security

Hands on hacking

Bug bounty playbook 1 and 2

Try Hack me

Pentesterlab

Websecurity academy

Hackthebox

vulnub

Subscription to

HackerOne

BugCrowd

Cobalt

Synack

Integriti

Approach

  • Asset discovery

  • Scope

  • Subdomain enumeration

    • Horizontal

    • Vertical

  • Open ports and services

  • Web hosting softwares, misconfigurations, exploits

  • Application framework

  • Application custom codes or cots

  • Application libraries

  • Integrations

Browser plugins

  • wappalyzer

  • whatruns

  • Webanalyze : cli tools

Nuclie

Nuclei -l httprobe.txt -t brute-force/* -t cves/* -t basic-detections/* -t dns/* -t files/* -t panels/* -t security-misconfiguration/* -t subdomain-takeover/* -t technologies/* -t tokes/* -t vulnerabilities/*

  • Know vulnerabilities

  • Framework logins

  • Default creds

Jaeles scanner

Ritire.js

Vulners burp extension

Intrigue core

Sn1per by

Gofingerprint

Portscanning

Naabu

contentdiscovery tools

  • Trubointruder

  • Gobuster

  • Ffuf

  • Dirsearch

  • Wfuzz

  • Feroxbuster

  • Dirbuster

Wordlist and content discovery

  • Wordlist.Assetnote.com

  • Jhaddix content discovery all

  • Robots disallowed

  • RAFT

  • Six2detonelistforall

  • Jhaddix api-endpoints.txt

  • Source2URL by danielmessier

  • Scavenger 0xdexter0us

  • Getallurls

  • Wordlistgen

  • Trashcompactor

  • Do recursive scans

  • Apkleaks

  • Changedetection.io

Application testing

  • How app stores and send the data

  • How app identifies user

Spidering

  • Zap

  • Burp

  • Gospider

  • Hackrawler

  • xlinkfinder

Subdomain Enumeration

Sunday, May 22, 2022

2:23 PM

sublist3r -d {domainName}

amass enum -d {domainName}

amass intel -org uber

From < https://danielmiessler.com/study/amass/>

amass intel -d target.com -whois

amass enum -passive -d target.com -src

amass enum -ip -d target.com

amass viz -d3 -dir resultdirectory

amass db -dir target.com(directory) -list

amass intel -ip -src -cidr 104.154.0.0/15

amass viz -d3 domains.txt -o 443 /your/dir/

Amass -src -ip -config amass_config.ini -d

Amass -asn

amass enum -d <URL> -p 443,8080

amass enum -d <URL1>,<URL2> -active

From < https://allabouttesting.org/owasp-amass-quick-tutorial-example-usage/>

From < https://allabouttesting.org/owasp-amass-quick-tutorial-example-usage/>

subfinder -d {domainName}

python3 subbrute.py {domainName}

python knock.py {domainName}

gobuster dns -d tesla.com -w simple-subdomain-list.txt

curl -k -s “ https://crt.sh/?q=tesla.com&output=json" | jq -r ‘.[] | “\(.name_value)\n\(.common_name)”’ | sort -u

curl -k -s https://sonar.omnisint.io/subdomains/tesla.com | jq -r ‘.[]’ | sort -u

ffuf -c -w /path/to/list -u https://tesla.com/FUZZ

ffuf -c -w /path/to/curated.txt -u https://tesla.com/FUZZ

Robots disallowed list

ffuf -c -w /path/to/directories.txt -u https://tesla.com/FUZZ

Fuzzing get parameters and values

ffuf -c -w /path/to/parameters.txt -u https://target/script.php?FUZZ=test_value

ffuf -c -w /path/to/parameters.txt -u https://target/script.php?valid_name=FUZZ

Password spraying and rate limit

ffuf -c -w /path/to/passwords.txt -X POST -d “username=admin\&password=FUZZ“ -u https://target/login.php

ffuf -w params.txt:PARAM -w values.txt:VAL -u https://example.org/?PARAM=VAL -mr “VAL” -c

dnsvalidator -tL https://public-dns.info/nameservers.txt -threads 100 -o resolvers.txt

Copied!

Last updated