πŸ˜‹Port 80-443 (http / https)

Automatic scanners

nikto -h <URL>
python crawleet.py -u <URL> -b -d 3 -e jpg,png,css -f -m -s -x php,txt -y --threads 20

Wordpress

# Scan
wpscan --rua -e --url <URL>

# Brute force user(s)
wpscan --rua --url <URL> -P <PASSWORDS_LIST> -U "<USER>,<USER>"

Wordpress panel RCE

Modifying a php from the theme used (admin credentials needed)

Appearance -> Editor -> 404 Template (at the right)
Change the content for a php shell
https://raw.githubusercontent.com/flozz/p0wny-shell/master/shell.php
http://<IP>/wp-content/themes/twentytwelve/404.php

Drupal

droopescan scan -u <URL>

Username enumeration

Hidden pages enumeration

Drupal panel RCE

Joomla

Tomcat

Default credentials

Brute force

Tomcat panel RCE

WebDav

HTTP brute force authentication

HTTP basic authentication

HTTP GET request

HTTP POST request

Spidering / Brute force directories / files

File backups

Once you have found all the files, look for backups of all the executable files (β€œ.php”, β€œ.aspxβ€œβ€¦). Common variations for naming a backup are

Local File Inclusion / Remote File Inclusion - LFI / RFI

Wrappers

Wrapper php://filter

Wrapper expect://

Wrapper data://

Wrapper input://

Useful LFI list

Tools

Command injection

For command injection always use BurpSuite !

Deserialization

File upload

SQL injection

XSS

Other web vulnerabilities

Upload a file with PUT

Last updated