Web Scanning
Nmap Script
nmap --script=http-enum <IP>
nmap --script=http-vuln* <IP>Banner grabbing
whatweb <IP>Nikto
nikto -h <IP>
nikto -h <IP> -p 80,8080,1234-Tuning Options
0 – File Upload
1 – Interesting File / Seen in logs
2 – Misconfiguration / Default File
3 – Information Disclosure
4 – Injection (XSS/Script/HTML)
5 – Remote File Retrieval – Inside Web Root
6 – Denial of Service
7 – Remote File Retrieval – Server Wide
8 – Command Execution / Remote Shell
9 – SQL Injection
a – Authentication Bypass
b – Software Identification
c – Remote Source Inclusion
x – Reverse Tuning Options (i.e., include all except specified)
nikto -Display 1234EP -o report.html -Format htm -Tuning 123bde -host <IP>Wordpress scan
Updating DB of WPScan
Scanning the target
Active Enumeration
p: Scans popular plugins only.
vp: Scans vulnerable plugins only.
ap: Scans all plugins.
t: Scans popular themes only.
vt: Scans vulnerable themes only.
at: Scans all themes.
To scan for all plugins
Enumerating wordpress users
Password Attack
Scanning with API Token
Disable-tls-checks
Backup files search
WebDav
Davtest
Used to test WebDAV enabled servers.
Cadavar
Uniscan
LFI, RFI and RCE vulnerability scanner
Git
Last updated