Look for any leaked information: usernames, passwords, credentials, etc.
Walk-through the website manually
Target -> Sitemap to view the generated sitemap
a. HTTP request/response headers
Server , X-Powered-By: leak of server technology and version
Server
X-Powered-By
Other X-xxx type headers
X-xxx
b. Query parameter
c. Request data
dirsearch
$
gobuster/ffuf/wfuzz
gobuster
ffuf
wfuzz
robots.txt
sitemap.xml
...
nikto, ZAP, etc.
The following additional enumeration can be performed in the event that we are unable to find any useful information from the first few steps.
paramspider, arjun, katana, etc. and any other open source automated web pentesting tools...
Last updated 2 months ago