Lots of strategies:
- Check server name for vulnerability, usually a software will be running with a vulnerability, lots of googling required
- Try to read the exploit code, most of the time it will give a hint whether you’re in the right spot or not
- Run dirbuster, nikto, dirsearch, ffuf etc
- Check the response size and manually check for the webpage in the dirbuster output i.e. don’t assume stuff, nikto is prone to false positives as well keep in mind, but nikto can spot the put functionality enabled so as soon as you see a file server type layout webserver , run nikto
- Enumerate for shell shock vulnerabilities.
- Login page found?, google for default creds ,try logically finding the username password using cewl
- Check for sql injection
- Check the URL for LFI,RFI
- Once logged in, try searching for the file manager to upload shell. Sometimes you wouldn’t need to login for an exploit to work i.e. it can be a rabbit hole if you are able to login easily so read the exploit code properly.
- Wordpress use wpscan, Joomla use joomscan, Drupal use droopscan .
- The answer is simpler than you think!!!!!!!!!!!!