-
Pre-manual Test & Automation
-
Open Ports and services
- Default creds on services
- Service level exploits
-
TOOLS
- Naabu (simple)
- RustScan (fast)
-
Web Hosting software
- default creds & web exploits
- web server misconfigurations
-
TOOLS
- Nuclei
- Jaeles
- TweetDeck
-
Application
- Libraries
- Framework
- Custom code or CTOS
-
TOOLS
- Wappalyzer & whatruns
- webanlayze CL tool
-
Content Discovery
-
Technology Wordlists
-
IIS / MFS
- httparchive_aspx_asp_cfm_svc_ashx_asmx_...
-
PHP & CGI
- httparchive_php_...
- httparchive_cgi_pl_...
-
GenralAPI
- httparchive_apiroutes_..
- swagger-wordlist.txt
- SecLists/../.../../api-endpoints.txt
-
Java
- httparchive_jasp_jspa_do_action_...
-
Generic
- httparchive_directories_1m_...
- OneListForAll
- Raft
- jhaddix/content_discovery_all.txt
-
Historical
- waymore tool
-
Custom wordlists
- Scavenger tool
-
Source code
- Source2URL tool
-
TOOLS
- FeroxBuster
- Ffuf
- Wfuzz
- dirsearch
- gobuster
-
Application Analysis
-
THE BIG 6 QUESTIONS
- How the app passes data.
- Where the app talks about users (e.g.cookie / api as a part of parameter / UID / Email / uuid / username).
- If sites have user levels / Multi-tenancy (e.g.Admin / Account Admin / Account User / Account Viewer / unauth funcs).
- If site has a unique threat model (e.g. primary stream key should be private in twitch).
- If there has been security research & vulns.
- How the app handles vulnerabilities (e.g.XSS / Sqli).
-
Spidering
-
TOOLS
- Burp & Zap
-
CL
- GoSpider
- Hakrawler
-
JS Parsing
-
TOOLS
- GAP Burp extension
-
CL
- xnLinkFinder
- Js Beautifier "online"
-
Parameter Anlysis
-
TOOLS
- run GF tool with a Pattern file
- Burp Bounty pro
-
Heat Mapping