Smart Directory Brute Forcing
After bruteforcing look for other status codes indicating you are denied or require auth then append list there to test for misconfigured access control.
Example:
GET http://www.acme.com - 200 GET http://www.acme.com/backlog/ - 404 GET http://www.acme.com/controlpanel/ - 401 hmm.. ok GET http://www.acme.com/controlpanel/[bruteforce here now]
Find previous/existing problem:
Issues might already reported but use the flaw area and injection type to guide you to further injections or filter bypass
New OSINT/Mapping project
Using + Ruby + Anemone + JSON + Grep
$cat test_target_json.txt | grep redirect https://test_target/redirect/?url=http://twitter.com https://test_target/redirect/?url=http://facebook.com/... https://test_target/redirect/?url=http://pinterest.com/...
OSINT framework, simple to integrate. Features like: