Review Webserver Metafiles
Check List
Methodology
Webserver Metafiles
Retrieve the robots.txt file from the target website to identify disallowed paths, hidden directories, or sensitive endpoints that may reveal internal structure or unintended exposures
Access the xmlrpc.php file to check for WordPress XML-RPC interfaces, assessing potential vulnerabilities like brute-force attacks or remote method execution
Fetch the sitemap.xml file to enumerate indexed URLs, uncovering pages, APIs, or resources that may expose additional attack surfaces or hidden content
Query the security.txt file to discover security contact information or vulnerability disclosure policies, identifying the target’s bug bounty program details or reporting channels
Check for the humans.txt file to gather metadata about the site’s developers or contributors, potentially revealing internal team details or associated technologies
Access the WordPress REST API endpoint to enumerate user information or public API data, testing for unauthorized data leaks or misconfigured access controls
Extract META tags from the target’s homepage to identify metadata like generator tags, CMS versions, or author details, providing insights into the technology stack or potential vulnerabilities
Cheat Sheet
robots.txt
curl $WEBSITE/robots.txtxmlrpc.php
curl $WEBSITE/xmlrpc.phpsitemap.xml
curl $WEBSITE/sitemap.xmlsecurity.txt
curl $WEBSITE/security.txthumans.txt
curl $WEBSITE/humans.txtMETA tags
curl $WEBSITE | grep 'meta'WordPress API
curl $WEBSITE/wp-json/wp/v2/users/Swagger API
curl $WEBSITE/swagger/v1/swagger.jsonSharePoint API
curl $WEBSITE/_api/web/FoldersLast updated