Skip to main content

Web Application Enumeration

Reference: https://owasp.org/www-project-top-ten/

Phase I — Enumeration

1. Technology Fingerprinting

Identify technologies running on the target:

2. Nmap Service Scan

sudo nmap -p 80 -sV $TARGET

3. Nmap HTTP Scripts

sudo nmap -p 80 --script=http-enum $TARGET

4. Directory Discovery

gobuster dir -u http://$TARGET -w /usr/share/wordlists/dirb/common.txt
tip

On engagements, use multiple wordlists and run them in the background. Decrease thread count with -t 5 to reduce traffic if needed.

Useful wordlists:

  • /usr/share/wordlists/dirb/common.txt
  • /usr/share/wordlists/dirb/big.txt
  • /usr/share/seclists/Discovery/Web-Content/raft-medium-files.txt
  • /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt

5. Manual Inspection

  • Inspect the entire page source
  • Right-click → Inspect input fields
  • Beautify code by clicking { } in bottom left in Firefox dev tools
  • Check all links and buttons
  • Navigate to all accessible pages

Tools

ToolPurpose
GoBusterDirectory and file brute forcing
wfuzzWeb fuzzing (parameters, directories, etc.)
Burp SuiteHTTP proxy, request manipulation, repeater
NiktoWeb server vulnerability scanner
CeWLCustom wordlist generator from target website
wpscanWordPress-specific scanner