Methodology Overview
Identify Technologies
Find the technologies being used to look for known vulnerabilities and useful tricks.
Initial Checks
Check default informational pages:
/robots.txt/sitemap.xml/crossdomain.xml/.well-known/- Check comments in main and secondary pages
Backup Checking
Check for backup files appending common extensions:
file.ext~, #file.ext#, ~file.ext, file.ext.bak, file.ext.tmp, file.ext.oldTechnology-Specific Tricks
CMS Scanners
CMS Scanners
Source Code Review
Source Code Review
If source code is available on GitHub:
- Check Change-log/Readme for version info
- Look for credentials in code, configs, commit history
- Search for hash algorithms, encryption keys
- Check Issues for unresolved vulnerabilities
Special Findings
Special Findings
.gitdirectory exposed → extract source code.envfile → API keys, DB passwords- JS files → use RetireJS to check for known vulnerabilities
- API endpoints → test for API-specific vulnerabilities
- 403 Forbidden → try bypass techniques
- 502 Proxy Error → potential misconfigured proxy/SSRF
- NTLM Authentication → info disclosure via NTLM challenge
NTLM Authentication Info Disclosure
Automated Command Reference
SSL/TLS Vulnerability Reference
- No HTTPS enforcement → MitM possible
- Sensitive data in HTTP → high severity
- Check for BEAST, POODLE, HEARTBLEED, ROBOT, DROWN via testssl.sh