eCPPTv2-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eCPPTv2 / PTP - Notes
  • 1️⃣1 - ​System Security
    • 1.1 Architecture Foundamentals
    • 1.2 Assemblers and Tools
    • 1.3 Buffer Overflow
    • 1.4 Cryptography
    • 1.5 Malware
    • 1.6 Shellcoding
  • 2️⃣2 - Network Security
    • 2.1 System/Host Based Attacks
      • 2.1.1 Windows Vulnerabilities
    • 2.2 Network Based Attacks
    • 2.3 The Metasploit Framework (MSF)
      • MSF Introduction
      • Information Gathering & Enumeration
      • Vulnerability Scanning
      • Client-Side Attacks
      • Post Exploitation
      • Armitage
    • 2.4 Exploitation
    • 2.5 - Post Expolitation / Pivoting
      • 2.5.1 Pivoting Guidelines
      • 2.5.2 Pivoting Example (3 Targets)
    • 2.6 Social Engineering
  • 3️⃣3 - PowerShell for PT
    • 3.1 PowerShell
  • 4️⃣4 - Linux Exploitation
    • 4.1 Linux Vulnerabilities
    • 4.2 Linux Exploitation
    • 4.3 Linux Post-Exploitation
    • 4.4 Linux Privilege Escalation
      • 4.4.1 Kernel Exploitation
      • 4.4.2 SUID Exploitation
      • 4.4.3 CronJobs
  • 5️⃣5 - Web App Security
    • 5.1 - Web App Concepts
      • 5.1.1 HTTP/S Protocol
      • 5.1.2 Encoding
      • 5.1.3 Same Origin
      • 5.1.4 Cookies
      • 5.1.5 Session
      • 5.1.6 Web App Proxies
    • 5.2 - Information Gathering
      • 5.2.1 Gathering Information on Your Targets
      • 5.2.2 Infrastructure
      • 5.2.3 Fingerprinting Frameworks and Applications
      • 5.2.4 Fingerprinting Custom Applications
      • 5.2.5 Enumerating Resources
      • 5.2.6 Information Disclosure Through Misconfiguration
      • 5.2.7 Google Hacking
      • 5.2.8 Shodan HQ
    • 5.3 - Cross Site Scripting
      • 5.3.1 XSS Anatomy
      • 5.3.2 Reflected XSS
      • 5.3.3 Stored XSS
      • 5.3.4 DOM-Based XSS
      • 5.3.5 Identifying & Exploiting XSS with XSSer
    • 5.4 - SQL Injection
      • 5.4.1 Introduction to SQL Injection
      • 5.4.2 Finding SQL Injection
      • 5.4.3 Exploiting In-Band SQL Injection
      • 5.4.4 Exploiting Error-Based SQL Injection
      • 5.4.5 Exploiting Blind SQL Injection
      • 5.4.6 SQLMap
      • 5.4.7 Mitigation Strategies
      • 5.4.8 From SQLi to Server Takeover
    • 5.5 - Other Common Web Attacks
      • 5.5.1 Session Attacks
      • 5.5.2 CSRF
  • 6️⃣6 - ​Wi-Fi Security
    • 6.1 Traffic Analysis
  • 7️⃣7 - ​Metasploit & Ruby
    • 7.1 Metasploit
  • 📄Report
    • How to write a PT Report
  • 🛣️RoadMap & My Experience
  • 📔eCPPT Cheat Sheet
Powered by GitBook
On this page
  • Crawling the Website
  • Crawling Process
  • Automated Crawling
  • Finding Hidden Files
  • Enumerating User Accounts
  • Usernames Enumeration
  • Tools for Enumeration
  • Update Your Map
  1. 5 - Web App Security
  2. 5.2 - Information Gathering

5.2.5 Enumerating Resources

In this phase of the information gathering process, we aim to enumerate various resources, including subdomains, website structure, hidden files, configuration files, and user accounts. Each aspect is crucial for understanding the target's architecture and potential vulnerabilities. Let's delve into the details:

Crawling the Website

Crawling Process

  • Tool:

    • Utilize Burp Proxy for automated crawling of the website.

  • Steps:

    1. Set the Scope:

      • Define the scope in the Target tab of Burp, specifying the domain (e.g., ^www\.domain\.com$).

    2. Activate Proxy:

      • Ensure the proxy is activated on port 8080.

    3. Start the Crawler:

      • Activate the crawler in the Spider tab.

    4. Browse with Proxy:

      • Browse the website with the proxy enabled.

Automated Crawling

  • Benefits:

    • Burp Proxy facilitates automatic form submission, crawling of pages accessible via POST requests, and exploration of login-protected areas.

    • Filtering options for better data analysis.

  • Burp Features:

    • Advantages:

      • The tool integrates a fuzzer and HTTP request editors for further testing.

      • Right-click options enable sending pages to Intruder for fuzzing or to Repeater for manual request alteration.

Finding Hidden Files

  • Using DirBuster:

    • Tool:

      • DirBuster, an OWASP project, is valuable for crawling and discovering hidden files.

    • Steps:

      1. Configure Settings:

        • Adjust DirBuster settings, including dictionary lists, extensions, user-agent, etc.

      2. Execute the Tool:

        • Run the tool to probe the file system through HTTP requests.

      3. Analyze Results:

        • Examine results presented as a tree of folders and files.

  • Backup and Source Code Files:

    • Objective:

      • Identify lazy coding practices, such as leaving backup files or source code files on the server.

    • Extensions to Probe:

      • Explore common extensions like .bak, .bac, .old, .000, ~, .01, \_bak, .001, .inc, .Xxx.

Enumerating User Accounts

Usernames Enumeration

  • Risks:

    • Poorly designed systems might inadvertently reveal sensitive information during the authentication process.

  • Example:

    • Incorrect login messages like "Login incorrect" or "Username blah does not exist" can expose valid usernames.

Tools for Enumeration

  • Usage:

    • Tools such as Burp Suite and Patator are effective for enumerating valid usernames.

  • Reminder:

    • Be cautious about the information revealed during the login stage.

Update Your Map

  • Importance:

    • Regularly update your information map with the findings, including enumerated usernames and any sensitive information.

Previous5.2.4 Fingerprinting Custom ApplicationsNext5.2.6 Information Disclosure Through Misconfiguration

Last updated 1 year ago

5️⃣