Search up the default credentials (eg. username, passwords) for that particular application
Given a username, or if permitted, attempt to brute-force the username too
$ hydra ... $ wfuzz ...
...
Eg, messages, comments, etc.
Basic manual inputs to test for the presence of SQLi vulnerability:
' " ...
$ sqlmap ...
upload web shell, .etc..
Last updated 9 days ago