• Web Application Security
    • Active Reconnaissance
      • Path Enumeration
      • Subdomains Enumeration
    • Exploits
    • Passive Reconnaissance
    • Webshells
#Web Application Security #Active Reconnaissance #Path Enumeration

Path Enumeration

Basic

Very basic and quick path enumeration can be done with Nmap built-in NSE script:

nmap -p80,443 --script=http-enum $ip

Brute-force

Files and directories enumeration. Wordlists:

  • /usr/share/wordlists/dirb/common.txt - all (link)
  • /usr/share/seclists/Discovery/Web-Content/combined_words.txt - files (link)
  • /usr/share/seclists/Discovery/Web-Content/combined_directories.txt - directories (link)

NOTE: If you discover a directory you must enumerate further starting from there. There may be nested files or further directories.

Fuff

Usage:

ffuf
    -u http://url.com/FUZZ
    -w $wordlist
    -H "Header: value"                      # Extra headers
    -b "Cookie=value;"                      # Extra cookies
    -x http://$ip:80                        # Proxy
    -timeout $seconds                       # HTTP request timeout
    -ac                                     # Auto-calibrate filtering

Gobuster

Gobuster is able to use pattern file (-p param). The {GOBUSTER} keyword is replaced by every single word from the provided wordlist. It increases number of variations.

An example of the API-related pattern file:

{GOBUSTER}/v1
{GOBUSTER}/v2
{GOBUSTER}/v3

Usage:

gobuster dir 
    -u $url 
    -w $wordlist 
    -t $threads                             # Number of threads
    -p $pattern_file                        # Pattern file
    -x php,html,pdf                         # Extensions 
    -r                                      # Follow redirects

Children

Path Enumeration