====== Toolkit & Setup ======
Tools used in the zseano/drew combined methodology.
===== Recon Tools =====
^ Tool ^ Purpose ^ Command ^
| **amass** | subdomain enumeration | ''amass enum -brute -active -d domain.com -o amass-output.txt'' |
| **subfinder** | passive subdomain enum | ''subfinder -d domain.com -o subs.txt'' |
| **httprobe** | find live http/https servers | ''cat subs.txt | httprobe -p http:81 -p http:3000 -p https:8443 -c 50'' |
| **dnsgen** | subdomain permutations | ''cat subs.txt | dnsgen - | httprobe'' |
| **anew** | diff old vs new lists | ''cat new.txt | anew old.txt'' |
| **aquatone** | screenshots of domains | ''cat domains.txt | aquatone'' |
| **certspotter** | cert transparency | ''curl https://certspotter.com/api/v0/certs?domain=domain.com'' |
| **gau** | fetch known URLs | ''gau domain.com'' |
| **waybackurls** | historical URLs | ''waybackurls domain.com'' |
===== Testing Tools =====
^ Tool ^ Purpose ^
| **Burp Suite** | intercept, modify & repeat requests |
| **ffuf** | directory and file fuzzing |
| **sqlmap** | SQL injection automation |
| **nuclei** | template-based scanning |
| **parameth / Arjun** | brute force hidden parameters |
| **linkfinder** | scrape URLs from javascript files |
| **inputscanner** | scrape input names, IDs, JS params |
| **autorize** | Burp plugin for authorization testing |
| **retire.js** | detect vulnerable JS libraries |
| **dalfox** | XSS scanner |
===== Key Commands =====
==== Subdomain Pipeline ====
amass enum -brute -active -d target.com -o amass-output.txt
subfinder -d target.com -o subs.txt
cat amass-output.txt subs.txt | sort -u | httprobe -p http:81 -p http:3000 -p https:8443 -c 50 | tee online.txt
cat online.txt | aquatone
==== Directory Fuzzing ====
ffuf -ac -v -u https://target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-large-words.txt
==== Historical URL Mining ====
gau target.com | sort -u > gau-urls.txt
waybackurls target.com | sort -u > wb-urls.txt
==== JS Endpoint Extraction ====
gau target.com | grep "\.js$"
cat file.js | grep -oP '(https?://[^\s"'"'"']+|/[a-zA-Z0-9_/-]+)'
==== SSRF Redirect Server ====
php -S 0.0.0.0:8080
# then expose via ngrok
ngrok http 8080
===== Wordlists =====
* **SecLists** -- danielmiessler/SecLists (everything)
* **RAFT lists** -- directory bruteforcing
* **commonspeak** -- pentester.io/commonspeak (bigquery-generated)
* **Custom per-target** -- build as you go from discovered endpoints/params
===== See Also =====
* [[zseano:recon|Recon Methodology]]
* [[zseano:start|Methodology Index]]
* [[tbhm:02_discovery|TBHM Discovery]]