mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-13 23:02:46 +00:00
Methodology - The Harvester + Checklist v2
This commit is contained in:
parent
7e739b02ad
commit
9211d40871
1 changed files with 12 additions and 13 deletions
|
@ -3,14 +3,14 @@
|
||||||
## Enumerate all subdomains (only if the scope is *.domain.ext)
|
## Enumerate all subdomains (only if the scope is *.domain.ext)
|
||||||
|
|
||||||
* Using Subbrute
|
* Using Subbrute
|
||||||
```
|
```bash
|
||||||
git clone https://github.com/TheRook/subbrute
|
git clone https://github.com/TheRook/subbrute
|
||||||
|
|
||||||
python subbrute.py domain.example.com
|
python subbrute.py domain.example.com
|
||||||
```
|
```
|
||||||
|
|
||||||
* Using KnockPy with Daniel Miessler’s SecLists for subdomain "/Discover/DNS"
|
* Using KnockPy with Daniel Miessler’s SecLists for subdomain "/Discover/DNS"
|
||||||
```
|
```bash
|
||||||
git clone https://github.com/guelfoweb/knock
|
git clone https://github.com/guelfoweb/knock
|
||||||
git clone https://github.com/danielmiessler/SecLists.git
|
git clone https://github.com/danielmiessler/SecLists.git
|
||||||
|
|
||||||
|
@ -18,14 +18,14 @@ knockpy domain.com -w /PATH_TO_SECLISTS/Discover/DNS/subdomains-top1mil-110000.t
|
||||||
```
|
```
|
||||||
|
|
||||||
* Using Google Dorks
|
* Using Google Dorks
|
||||||
```
|
```bash
|
||||||
site:*.domain.com -www
|
site:*.domain.com -www
|
||||||
site:http://domain.com ext:php
|
site:http://domain.com ext:php
|
||||||
site:http://domain.com filetype:pdf
|
site:http://domain.com filetype:pdf
|
||||||
```
|
```
|
||||||
|
|
||||||
* Using Jason Haddix's enumall Recon-ng script,
|
* Using Jason Haddix's enumall Recon-ng script,
|
||||||
```
|
```bash
|
||||||
git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
|
git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
|
||||||
cd recon-ng
|
cd recon-ng
|
||||||
pip install -r REQUIREMENTS
|
pip install -r REQUIREMENTS
|
||||||
|
@ -42,14 +42,14 @@ cd domain
|
||||||
```
|
```
|
||||||
|
|
||||||
* Subdomain take over using HostileSubBruteForcer
|
* Subdomain take over using HostileSubBruteForcer
|
||||||
```
|
```bash
|
||||||
git clone https://github.com/nahamsec/HostileSubBruteforcer
|
git clone https://github.com/nahamsec/HostileSubBruteforcer
|
||||||
chmox +x sub_brute.rb
|
chmox +x sub_brute.rb
|
||||||
./sub_brute.rb
|
./sub_brute.rb
|
||||||
```
|
```
|
||||||
|
|
||||||
* EyeWitness and Nmap scans from the KnockPy and enumall scans
|
* EyeWitness and Nmap scans from the KnockPy and enumall scans
|
||||||
```
|
```bash
|
||||||
git clone https://github.com/ChrisTruncer/EyeWitness.git
|
git clone https://github.com/ChrisTruncer/EyeWitness.git
|
||||||
./setup/setup.sh
|
./setup/setup.sh
|
||||||
./EyeWitness.py -f filename -t optionaltimeout --open (Optional)
|
./EyeWitness.py -f filename -t optionaltimeout --open (Optional)
|
||||||
|
@ -96,7 +96,7 @@ List Nmap scripts : ls /usr/share/nmap/scripts/
|
||||||
|
|
||||||
## List all the subdirectories and files
|
## List all the subdirectories and files
|
||||||
* Using DirBuster or GoBuster
|
* Using DirBuster or GoBuster
|
||||||
```
|
```bash
|
||||||
./gobuster -u http://buffered.io/ -w words.txt -t 10
|
./gobuster -u http://buffered.io/ -w words.txt -t 10
|
||||||
-u url
|
-u url
|
||||||
-w wordlist
|
-w wordlist
|
||||||
|
@ -110,14 +110,14 @@ gobuster -w wordlist -u URL -r -e
|
||||||
|
|
||||||
|
|
||||||
* Using a script to detect all phpinfo.php files in a range of IPs (CIDR can be found with a whois)
|
* Using a script to detect all phpinfo.php files in a range of IPs (CIDR can be found with a whois)
|
||||||
```
|
```bash
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
|
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
|
||||||
wget -t 1 -T 3 http://${ipa}/phpinfo.php; done &
|
wget -t 1 -T 3 http://${ipa}/phpinfo.php; done &
|
||||||
```
|
```
|
||||||
|
|
||||||
* Using a script to detect all .htpasswd files in a range of IPs
|
* Using a script to detect all .htpasswd files in a range of IPs
|
||||||
```
|
```bash
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
|
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
|
||||||
wget -t 1 -T 3 http://${ipa}/.htpasswd; done &
|
wget -t 1 -T 3 http://${ipa}/.htpasswd; done &
|
||||||
|
@ -132,11 +132,10 @@ gitrob analyze johndoe --site=https://github.acme.com --endpoint=https://github.
|
||||||
```
|
```
|
||||||
|
|
||||||
* Explore the website with a proxy (ZAP/Burp Suite)
|
* Explore the website with a proxy (ZAP/Burp Suite)
|
||||||
|
1. Start ZAP proxy, visit the main target site and perform a Forced Browse to discover files and directories
|
||||||
|
2. Map technologies used with Wappalyzer and Burp Suite (or ZAP) proxy
|
||||||
|
3. Explore and understand available functionality, noting areas that correspond to vulnerability types
|
||||||
```
|
```
|
||||||
- Start ZAP proxy, visit the main target site and perform a Forced Browse to discover files and directories
|
|
||||||
- Map technologies used with Wappalyzer and Burp Suite (or ZAP) proxy
|
|
||||||
- Explore and understand available functionality, noting areas that correspond to vulnerability types
|
|
||||||
|
|
||||||
Burp Proxy configuration on port 8080 (in .bashrc):
|
Burp Proxy configuration on port 8080 (in .bashrc):
|
||||||
alias set_proxy_burp='gsettings set org.gnome.system.proxy.http host "http://localhost";gsettings set org.gnome.system.proxy.http port 8080;gsettings set org.gnome.system.proxy mode "manual"'
|
alias set_proxy_burp='gsettings set org.gnome.system.proxy.http host "http://localhost";gsettings set org.gnome.system.proxy.http port 8080;gsettings set org.gnome.system.proxy mode "manual"'
|
||||||
then launch Burp with : java -jar burpsuite_free_v*.jar &
|
then launch Burp with : java -jar burpsuite_free_v*.jar &
|
||||||
|
|
Loading…
Reference in a new issue