User Tools

Site Tools


tbhm:03_mapping

This is an old revision of the document!


# Mapping

## Mapping Tips: - Google - Smart Directory Brute Forcing

  1. RAFT lists (included in Seclists)
  2. SVN Digger (included in Seclists)
  3. Git Digger

- Platform Identification:

  1. Wapplyzer (Chrome)
  2. Builtwith (Chrome)
  3. retire.js (cmd-line or Burp)
  4. Check CVEs

- Auxiliary

  1. WPScan
  2. CMSmap

## Directory Bruteforce Workflow After bruteforcing look for other status codes indicating you are denied or require auth then append list there to test for misconfigured access control.

Example:

``` GET http://www.acme.com - 200 GET http://www.acme.com/backlog/ - 404 GET http://www.acme.com/controlpanel/ - 401 hmm.. ok GET http://www.acme.com/controlpanel/[bruteforce here now] ```

## Mapping/Vuln Discovery using OSINT Find previous/existing problem: - Xssed.com - Reddit XSS - /r/xss - Punkspider - xss.cx - xssposed.org - twitter searching

Issues might already reported but use the flaw area and injection type to guide you to further injections or filter bypass

## New Project: Maps New OSINT/Mapping project - 250+ bounty programs - Crawl - DNS info + bruteforce - Bounty metadata (links, rewards, scope) - API → Intrigue

https://github.com/bugcrowdlabs/maps

### Using the Maps Project: Crawling Using + Ruby + Anemone + JSON + Grep

``` $cat test_target_json.txt | grep redirect

https://test_target/redirect/?url=http://twitter.com https://test_target/redirect/?url=http://facebook.com/https://test_target/redirect/?url=http://pinterest.com/… ```

## New Tool: Intrigue OSINT framework, simple to integrate. Features like: - DNS Subdomain Brute force - Web Spider - Nmap Scan - etc

Code @ http://github.com/intrigueio/intrigue-core

tbhm/03_mapping.1778746727.txt.gz · Last modified: by drew

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki