CheckList
CheckList
Lots of strategies:
Check server name for vulnerability, usually a software will be running with a vulnerability, lots of googling required
Try to read the exploit code, most of the time it will give a hint whether you’re in the right spot or not
Run dirbuster, nikto, dirsearch, ffuf etc
Check the response size and manually check for the webpage in the dirbuster output i.e. don’t assume stuff, nikto is prone to false positives as well keep in mind, but nikto can spot the put functionality enabled so as soon as you see a file server type layout webserver , run nikto
Enumerate for shell shock vulnerabilities.
Login page found?, google for default creds ,try logically finding the username password using cewl
Check for sql injection
Check the URL for LFI,RFI
Once logged in, try searching for the file manager to upload shell. Sometimes you wouldn’t need to login for an exploit to work i.e. it can be a rabbit hole if you are able to login easily so read the exploit code properly.
Wordpress use wpscan, Joomla use joomscan, Drupal use droopscan .
The answer is simpler than you think!!!!!!!!!!!!
Last updated