====== Mapping ======
===== Mapping Tips: =====
* Google
// Smart// Directory Brute Forcing
* RAFT lists (included in Seclists)
* SVN Digger (included in Seclists)
* Git Digger
* Platform Identification:
* Wapplyzer (Chrome)
* Builtwith (Chrome)
* retire.js (cmd-line or Burp)
* Check CVE's
* Auxiliary
* WPScan
* CMSmap
===== Directory Bruteforce Workflow =====
After bruteforcing look for other status codes indicating you are denied or require auth then append list there to test for misconfigured access control.
Example:
GET http://www.acme.com - 200
GET http://www.acme.com/backlog/ - 404
GET http://www.acme.com/controlpanel/ - 401 hmm.. ok
GET http://www.acme.com/controlpanel/[bruteforce here now]
===== Mapping/Vuln Discovery using OSINT =====
Find previous/existing problem:
* Xssed.com
* Reddit XSS - /r/xss
* Punkspider
* xss.cx
* xssposed.org
* twitter searching
Issues might already reported but use the flaw area and injection type to guide you to further injections or filter bypass
===== New Project: Maps =====
New OSINT/Mapping project
* 250+ bounty programs
* Crawl
* DNS info + bruteforce
* Bounty metadata (links, rewards, scope)
* API -> Intrigue
https://github.com/bugcrowdlabs/maps
==== Using the Maps Project: Crawling ====
Using + Ruby + Anemone + JSON + Grep
$cat test_target_json.txt | grep redirect
https://test_target/redirect/?url=http://twitter.com
https://test_target/redirect/?url=http://facebook.com/...
https://test_target/redirect/?url=http://pinterest.com/...
===== New Tool: Intrigue =====
OSINT framework, simple to integrate. Features like:
* DNS Subdomain Brute force
* Web Spider
* Nmap Scan
* etc
Code @ http://github.com/intrigueio/intrigue-core