App Platform Configuration

Check List

Methodology

TOR Technique for Finding Sensitive Routes

1

Using the following command that works with the TOR tool, it creates 20 independent Tor proxies (SOCKS + control) for the debian-tor user and places them behind Privoxy so programs can use them. And it makes it easier for an attacker to send requests to the server

2

Using the next command, we scan the web server to find out what features it has and get a list of the web server's features

3

Then, using the following commands, we get a list of target subdomains and then using the HTTPX tool command, we check whether the subdomains we got are active

4

And we can use the next command to find out the open ports of all active subdomains

5

Using the Katana tool command, we crawl all pages and find the target points and files

6

Using the Katana tool command, we crawl all the pages and find the target points and files, and then we run it using the Grep command to find and show us if there is a sensitive file in our crawl output

7

And then using the Dirsearch tool command, which we run on all the subdomains that are hit, to find all the sensitive paths or even sensitive files that could expose information about users or the web server

8

Using the Nuclei command, we can find vulnerabilities and CVEs on the target to identify the presence of vulnerabilities, and using the next commands, we can run commands related to the target's use of different CMSs on the target


Cheat Sheet

Sample And Known Files And Directories

20 Tor Tunnel

multitor --init 20 \
         --user debian-tor \
         --socks-port 9000 \
         --control-port 9900 \
         --proxy privoxy

Scan Web Server

Subdomain Fuzzing

Resolve Subdomains

Check Http Live

Find Alive Ports

Find Source URLs

Find Sensitive Infos

Directory Fuzzing

List all Tags

Scan OSINT & Recon

Scan CVEs & Vulnerabilities

Scan CVEs with Multitor

Scan Misconf & Panel

XSS & SQLi & LFI & RCE & SSRF

Scan General

Scan with Multitor

Enum Users

Enum Plugins

Enum Themes

Enum Config Backups

Enum Plugins

Scan General

Scan with Multitor

Enum Endpoints

Scan General

Enum Endpoints

Scan General

Enum Endpoints

Enum Users

Scan SharePoint

Scan & Enum IIS

Scan API

Scan Permission v1

Scan Permission v2

Comment Review

HTML Sources

JS Sources

CSS Sources

System Configuration

Configuration Review

HTTP Methods

PingBack XMLRPC

Brute force XMLRPC with Multitor

Scan PUT Methods

Start Ngrok

Define ENV Ngrok

Cert Spoof

Define ENV Cert

Post-EXP

Generate Webshell

Listening Metasploit

Upload Shell PUT Method

Logging

Code Injection

Last updated