App Platform Configuration
Check List
Methodology
TOR Technique for Finding Sensitive Routes
Using the following command that works with the TOR tool, it creates 20 independent Tor proxies (SOCKS + control) for the debian-tor user and places them behind Privoxy so programs can use them. And it makes it easier for an attacker to send requests to the server
Using the next command, we scan the web server to find out what features it has and get a list of the web server's features
Then, using the following commands, we get a list of target subdomains and then using the HTTPX tool command, we check whether the subdomains we got are active
And we can use the next command to find out the open ports of all active subdomains
Using the Katana tool command, we crawl all pages and find the target points and files
Using the Katana tool command, we crawl all the pages and find the target points and files, and then we run it using the Grep command to find and show us if there is a sensitive file in our crawl output
And then using the Dirsearch tool command, which we run on all the subdomains that are hit, to find all the sensitive paths or even sensitive files that could expose information about users or the web server
Using the Nuclei command, we can find vulnerabilities and CVEs on the target to identify the presence of vulnerabilities, and using the next commands, we can run commands related to the target's use of different CMSs on the target
Cheat Sheet
Sample And Known Files And Directories
multitor --init 20 \
--user debian-tor \
--socks-port 9000 \
--control-port 9900 \
--proxy privoxyComment Review
System Configuration
Configuration Review
Logging
Last updated