Methodology
Reconnaissance
1.1 Subdomain enumeration
Intrusionz3r0@htb[/htb]$ dnsenum --enum hackerone.com -f /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -r
Intrusionz3r0@htb[/htb]$ subfinder -d target.com -all -recursive -t 200 -silent -o subfinder-rescursive.txt
Intrusionz3r0@htb[/htb]$ findomain --quiet -t target.com | tee findomain.txt
Intrusionz3r0@htb[/htb]$ amass enum -passive -d target.com -o amass.txt
Intrusionz3r0@htb[/htb]$ assetfinder -subs-only target.com | tee assetfinder.txt
Intrusionz3r0@htb[/htb]$ sublist3r -d target.com -t 50 -o sublist3r.txt1.2 DNS Resolution and Probing
1.3 HTTP Probing (Identifying Live Web Services)
1.4 Screenshotting Web Services
1.5 Content Discovery (Brute Forcing)
1.6 Parameter Discovery
1.7 Archived URLs
1.8 Filtering Interesting URLs
1.9 Crawling and Spidering
1.10 ASN and IP range enumeration
1.11 Cloud Asset Enumeration
1.10 Fingerprinting Web Technologies
Mapping the Attack Surface
Resources:
Last updated