Web App Enumeration Playbook
STEPS
Port scan the machine. Check for open ports.
Browse to the open web server. If it tries to resolve a name of the app, go to /etc/hosts file and insert the IP and name of the web app to resolve through DNS.
ALWAYS VIEW PAGE SOURCE TO CHECK FOR OTHER TECHNOLOGIES THAT MIGHT BE USED LIKE PLUGINS OR COMMENTS LEFT BY DEVS THAT MIGHT REVEAL SENSITIVE INFORMATION!
Use wappalyzer extension to enumerate for technologies used by the webapp.
Do directory fuzzing.
Do subdomain/virtual host enumeration.
Use cURL or/and Burpsuite to check for requests and responses to collect information such as: Scripting language, library names and versions, HTTP response headers.
If version enumeration was successful, use searchsploit or google to search for public exploits.
If not, try to test the functionalities of the web app to do manual exploitation and information gathering.
LOGIN PAGES
If we encounter login pages, try to use default credentials.
If not, try to SQL inject the page to bypass authentication. (Use AuthBypass wordlist with intruder to check if any payload works)
If not, try to enumerate the rest of the site to find credentials to access.
As a last resort, you can brute-force the login page.
Last updated