Run recon while doing manual testing in parallel. Don't wait for tools to finish before hacking.
Before touching the site:
site:google.com “domain.com” vulnerabilityamass enum -brute -active -d domain.com -o amass-output.txt subfinder -d domain.com -o subs.txt cat amass-output.txt subs.txt | sort -u | tee all-subs.txt cat all-subs.txt | httprobe -p http:81 -p http:3000 -p https:8443 -c 50 | tee online.txt cat online.txt | aquatone cat all-subs.txt | dnsgen - | httprobe # permutation discovery
dev, qa, staging, prod, admin, internalcareers.target.com)site:target.com inurl:& -movies site:target.com inurl:register inurl:& site:target.com inurl:login site:target.com ext:php | ext:aspx | ext:jsp | ext:txt | ext:xml | ext:bak
-keyword to exclude noise“domain.com” + api_secret, api_key, apiKey, password, admin_password# Scan robots.txt on every subdomain via Burp Intruder # Historical URLs gau target.com | sort -u > gau-urls.txt waybackurls target.com | sort -u > wb-urls.txt
.bak, .old, .zipffuf -ac -v -u https://domain/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-large-words.txt
/admin, /server-status, then expandgau target.com | grep "\.js$" | tee js-files.txt # Use linkfinder to extract endpoints python3 linkfinder.py -i https://target.com/app.js -o cli
var name = “” patterns in JS/endpoint?param1=xss¶m2=xsscurl https://certspotter.com/api/v0/certs?domain=domain.com
endpoints.txt and params.txt as you discover themglobal-endpoints.txt