App Platform Configuration

Check List

Methodology

TOR Technique for Finding Sensitive Routes

1

Using the following command that works with the TOR tool, it creates 20 independent Tor proxies (SOCKS + control) for the debian-tor user and places them behind Privoxy so programs can use them. And it makes it easier for an attacker to send requests to the server

2

Using the next command, we scan the web server to find out what features it has and get a list of the web server's features

3

Then, using the following commands, we get a list of target subdomains and then using the HTTPX tool command, we check whether the subdomains we got are active

4

And we can use the next command to find out the open ports of all active subdomains

5

Using the Katana tool command, we crawl all pages and find the target points and files

6

Using the Katana tool command, we crawl all the pages and find the target points and files, and then we run it using the Grep command to find and show us if there is a sensitive file in our crawl output

7

And then using the Dirsearch tool command, which we run on all the subdomains that are hit, to find all the sensitive paths or even sensitive files that could expose information about users or the web server

8

Using the Nuclei command, we can find vulnerabilities and CVEs on the target to identify the presence of vulnerabilities, and using the next commands, we can run commands related to the target's use of different CMSs on the target


Cheat Sheet

Sample And Known Files And Directories

circle-info

20 Tor Tunnel

multitor --init 20 \
         --user debian-tor \
         --socks-port 9000 \
         --control-port 9900 \
         --proxy privoxy

circle-info

Scan Web Server

circle-info

Subdomain Fuzzing

circle-info

Resolve Subdomains

circle-info

Check Http Live

circle-info

Find Alive Ports

circle-info

Find Source URLs

circle-info

Find Sensitive Infos

circle-info

Directory Fuzzing

circle-info

List all Tags

circle-info

Scan OSINT & Recon

circle-info

Scan CVEs & Vulnerabilities

circle-info

Scan CVEs with Multitor

circle-info

Scan Misconf & Panel

circle-info

XSS & SQLi & LFI & RCE & SSRF

circle-info

Scan General

circle-info

Scan with Multitor

circle-info

Enum Users

circle-info

Enum Plugins

circle-info

Enum Themes

circle-info

Enum Config Backups

circle-info

Enum Plugins

circle-info

Scan General

circle-info

Scan with Multitor

circle-info

Enum Endpoints

circle-info

Scan General

circle-info

Enum Endpoints

circle-info

Scan General

circle-info

Enum Endpoints

circle-info

Enum Users

circle-info

Scan SharePoint

circle-info

Scan & Enum IIS

circle-info

Scan API

circle-info

Scan Permission v1

circle-info

Scan Permission v2

Comment Review

circle-info

HTML Sources

circle-info

JS Sources

circle-info

CSS Sources

System Configuration

Configuration Review

circle-info

HTTP Methods

circle-info

PingBack XMLRPC

circle-info

Brute force XMLRPC with Multitor

circle-info

Scan PUT Methods

circle-info

Start Ngrok

circle-info

Define ENV Ngrok

circle-info

Cert Spoof

circle-info

Define ENV Cert

circle-info

Post-EXP

circle-info

Generate Webshell

circle-info

Listening Metasploit

circle-info

Upload Shell PUT Method

Logging

circle-info

Code Injection

Last updated