Web Basic Pentesting
Cheat Sheet
Enumeration
Nmap
nmap --script http-auth --script-args http-auth.path=/login -p 80,443 <target-ip>
nmap --script http-devframework -p 80,443 <target-ip>
nmap --script http-enum -p 80,443 <target-ip>
nmap --script http-headers -p 80,443 <target-ip>
nmap --script http-methods -p 80,443 <target-ip>Whois
whois example.comNikto
nikto -h https://example.com
# -p: Specify ports
nikto -p 80,3000 -h https://example.com
# -T: Tuning
# 1: Interesting files
# 2: Misconfiguration
# 3: Information Disclosure
# 4: Injection (XSS/Script/HTML)
nikto -T 1 2 3 -h https://example.com
# -useragent: Custom user agent
nikto -useragent <user-agent> -h https://example.com
# -e: IDS evasion
# 1: Random URI encoding
# 7: Change the case of URL
nikto -e 1 7 -h <target-ip>WhatWeb
SSL Certificate
Check Certificate Content
Web Archive
Google Dorks
Bypass HTTPS Forbidden (403)
Check Comments in HTML Source
Find Source Code
Request using Python
GET Request
POST Request
Last updated