Review Old Backup
Check List
Methodology
Sensitive Backup/File Disclosure Via Directory Enumeration And Brute-Forcing
Using the first commands related to Google Dork, we replace $WEBSITE with the target domain name and then execute it
Then, using the X8 command and subsequent commands, we execute hidden parameters that contain old and sensitive files on the target
Then, we run the following commands on the target using Gobuster and FFUF tools and a combination of tools such as FFUF and Katana to identify all sensitive paths and sensitive files on the target
Then, we can use the script we created to run all these tools with one click on the target using their switches that speed up the work. If old files are backed up and saved, which the programmer may not have deleted, and contain important information such as web server configuration and admin password and username, they will be found and cause vulnerability
Cheat Sheet
Use of Publicly Available Information
ext:bak |
ext:bck |
ext:bac |
ext:old |
ext:tmp |
ext:bkp |
ext:bak |
ext:old |
ext:sql |
ext:backup |
ext:tar |
ext:daf
site:$WEBSITEBlind Guessing
Last updated