πPort 80-443 (http / https)
Automatic scanners
nikto -h <URL>
python crawleet.py -u <URL> -b -d 3 -e jpg,png,css -f -m -s -x php,txt -y --threads 20Wordpress
# Scan
wpscan --rua -e --url <URL>
# Brute force user(s)
wpscan --rua --url <URL> -P <PASSWORDS_LIST> -U "<USER>,<USER>"Modifying a php from the theme used (admin credentials needed)
Appearance -> Editor -> 404 Template (at the right)
Change the content for a php shell
https://raw.githubusercontent.com/flozz/p0wny-shell/master/shell.php
http://<IP>/wp-content/themes/twentytwelve/404.phpDrupal
droopescan scan -u <URL>Joomla
Tomcat
WebDav
HTTP brute force authentication
Spidering / Brute force directories / files
Local File Inclusion / Remote File Inclusion - LFI / RFI
Command injection
Deserialization
File upload
SQL injection
XSS
Other web vulnerabilities
Upload a file with PUT
Last updated