# CheckList

### CheckList

*Lots of strategies:*

* Check server name for vulnerability, usually a software will be running with a vulnerability, lots of googling required&#x20;
* Try to read the exploit code, most of the time it will give a hint whether you’re in the right spot or not
* Run dirbuster, nikto, dirsearch, ffuf etc
* Check the response size and manually check for the webpage in the dirbuster output i.e. don’t assume stuff, nikto is prone to false positives as well keep in mind, but nikto can spot the put functionality enabled so as soon as you see a file server type layout webserver , run nikto
* Enumerate for shell shock vulnerabilities.&#x20;
* Login page found?, google for default creds ,try logically finding the username password using cewl
* Check for sql injection
* Check the URL for LFI,RFI&#x20;
* Once logged in, try searching for the file manager to upload shell. Sometimes you wouldn’t need to login for an exploit to work i.e. it can be a rabbit hole if you are able to login easily so read the exploit code properly.&#x20;
* Wordpress use wpscan, Joomla use joomscan, Drupal use droopscan .&#x20;
* The answer is simpler than you think!!!!!!!!!!!!


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ed4m4s.blog/master-1/http-enum/checklist.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
