Enumerate Admin Interfaces

Check List

Methodology

Admin Panel Enumeration / Exposed Admin-Login Path Disclosure

1

To find the paths that exist for the admin login, use the first command used for robots.txt. This path may be leaked in this file, or using Google Dork, we can identify all the paths related to the admin page in the target

2

Then, using the commands related to the scanning tools, identify the paths related to the admin login page on the target

3

We can run the Nmap command on the target with the switch for login pages, which may be for the admin

4

Sometimes, writing a program inside the comments inside the pages will cause this error to leak the admin login page, which will cause vulnerability. Using the Katana command, we can perform this operation on the comments, and we can use the created script to find the path to the admin login page and execute it on the target


Cheat Sheet

Search Engine Discovery

robots.txt

curl $WEBSITE/robots.txt

inurl:admin |
inurl:adminstrator |
inurl:admin-panel |
inurl:admin-dashboard |
inurl:wp-admin |
inurl:phpmyadmin |
inurl:dbadmin |
inurl:controlpanel |
inurl:adminpanel |
inurl:login |
intitle:admin |
intitle:login
site:$WEBSITE

Port Scan

Subdomain Fuzzing

Directory Fuzzing

Extract URLs

Create Script

Run Script

Last updated