SlideShare a Scribd company logo
Enumeration
90% of research 10% exploitation.
Poke Around
Check page source code.
Find application features.
Understand the app purpose.
File And Directory Bruteforcing
Find hidden gems: /admin, /consoleand more.
Find things that may be hidden: ., ~, etc.
Bash File And Dir Bruteforcer
This can be easily achieved with a bit of shell scripting.
cat dict.txt | while read WORD
do
OUTPUT=`curl -I -s "http://target/$WORD"`
echo -n "$WORD - `echo $OUTPUT | head -1`"
done
The only problem is that this could be very slow for larger dictionaries.
Bruteforcing Tools
DirBuster is a very good tool for this.
Some tools like Burp can also be used for bruteforcing.
Error Message Analysis
Requesting non-existent resources.
Supplying weird values to input fields.
Sending completely broken HTTP requests.
Use known tricks such as ?var[]=123for PHP apps.
Alternative Ports
Common HTTP ports: 80, 443, 8080, 8443, etc.
Run a port scanner like nmap.
Alternative Access
Web services (WSDL): .wsdl, .asmx.
Other login interfaces.
Desktop and Mobile clients.
Java, Flash, AJAX and other RIAs.
Public Enumeration Tricks
Using Google we can find publicly-known information.
ext:wsdl domain:target
ext:exe domain:target
Supported Methods
Send OPTIONSmethod to various locations.
OPTIONS / HTTP/1.0
Keep in mind that REST applications can support arbitrary method names.
Virtual Hosts
Bind/MSN Search: ip:<ip>directive.
Google: site:<domain>directive.
DNS bruteforcing.
VirtualHost databases.
Netcraft.
Load Balancers
BIG IP cookies.
Changes in the Date:headers.
Changes in DNS responses.
Changes in packet ids.
hping2 ip -S -p 80 -i u1000 -c 30
HPING ip (eth0 x.x.x.x): S set, 40 headers + 0 data bytes
len=46 ip=hidden ttl=51 DF id=58489 sport=80 flags=SA seq=0 win=24656 rtt=2
len=46 ip=hidden ttl=51 DF id=16912 sport=80 flags=SA seq=2 win=24656 rtt=2
len=46 ip=hidden ttl=51 DF id=58490 sport=80 flags=SA seq=3 win=24656 rtt=1
len=46 ip=hidden ttl=51 DF id=16913 sport=80 flags=SA seq=4 win=24656 rtt=1
len=46 ip=hidden ttl=51 DF id=58491 sport=80 flags=SA seq=5 win=24656 rtt=2
len=46 ip=hidden ttl=51 DF id=16914 sport=80 flags=SA seq=7 win=24656 rtt=1
Google Hacking
Useful directives: inurl:, site:, intext:, ext:and more.
Google Hacking Database
Lab
We will apply all that we have learned.
Challenges
1. Enumerate the files and directories of a demo app.
1. Use shell scripting.
2. Use ready-made tool.
2. Find a PHP app and locate some errors.
3. Enumerate alternative access interfaces of a demo app.
4. Enumerate supported methods of a demo apps.
5. Fingerprint the vhosts of a random target.
6. Find web cameras using a Google Dork.

More Related Content

What's hot (20)

PDF
Tablespaces
Vinay Thota
 
PDF
Kraska.eco.pl
pierre110
 
ODP
Oop bullets graphical
swathi4crazy
 
PPTX
Hadoop installation on windows
habeebulla g
 
PDF
NOSQL: il rinascimento dei database?
Paolo Bernardi
 
PPTX
On secure application of PHP wrappers
Positive Hack Days
 
PPTX
My First Cluster with MongoDB Atlas
Jay Gordon
 
PDF
DUG'20: 12 - DAOS in Lenovo’s HPC Innovation Center
Andrey Kudryavtsev
 
PDF
TDDBC お題
Takuto Wada
 
PPTX
Ch3(working with file)
Chhom Karath
 
PDF
MCE^3 - Lasse Koskela - Full-Text Search on iOS and Android
PROIDEA
 
PDF
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Andrea Lazzarotto
 
ODP
Beyond PHP - It's not (just) about the code
Wim Godden
 
PPT
Breaking first-normal form with Hive
Edward Capriolo
 
PDF
MySQL to Neo4j: A DBA Perspective - David Stern @ GraphConnect NY 2013
Neo4j
 
PDF
Drill 1.0
MapR Technologies
 
PPTX
10 context switching
JihoonKim157
 
PDF
RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Me...
Andrea Lazzarotto
 
PDF
dns.workshop.hsgr
ebalaskas
 
PPTX
Drupal 101: Tips and Tricks for Troubleshooting Drupal
Acquia
 
Tablespaces
Vinay Thota
 
Kraska.eco.pl
pierre110
 
Oop bullets graphical
swathi4crazy
 
Hadoop installation on windows
habeebulla g
 
NOSQL: il rinascimento dei database?
Paolo Bernardi
 
On secure application of PHP wrappers
Positive Hack Days
 
My First Cluster with MongoDB Atlas
Jay Gordon
 
DUG'20: 12 - DAOS in Lenovo’s HPC Innovation Center
Andrey Kudryavtsev
 
TDDBC お題
Takuto Wada
 
Ch3(working with file)
Chhom Karath
 
MCE^3 - Lasse Koskela - Full-Text Search on iOS and Android
PROIDEA
 
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Andrea Lazzarotto
 
Beyond PHP - It's not (just) about the code
Wim Godden
 
Breaking first-normal form with Hive
Edward Capriolo
 
MySQL to Neo4j: A DBA Perspective - David Stern @ GraphConnect NY 2013
Neo4j
 
10 context switching
JihoonKim157
 
RecuperaBit: Forensic File System Reconstruction Given Partially Corrupted Me...
Andrea Lazzarotto
 
dns.workshop.hsgr
ebalaskas
 
Drupal 101: Tips and Tricks for Troubleshooting Drupal
Acquia
 

Similar to Web Application Security 101 - 05 Enumeration (20)

PDF
SOHOpelessly Broken
The Security of Things Forum
 
PDF
Pentesting an unfriendly environment: bypassing (un)common defences and mate ...
Sandro Zaccarini
 
PPS
Aditya - Hacking Client Side Insecurities - ClubHack2008
ClubHack
 
PDF
4 Mapping the Application
Sam Bowne
 
PPT
A tale of two proxies
SensePost
 
PPTX
Hunting Botnets with Zmap
HeadlessZeke
 
PPTX
08- pen-testing Web applications attacks.pptx
wassimahmad9
 
PDF
Google Hacking
Pim Piepers
 
PDF
Advanced googling
sonuagain
 
PDF
Hackbattle 2013 Walkthrough (Nasty Salon V2)
Munir Njiru
 
PPTX
Course_Presentation cyber --------------.pptx
ssuser020436
 
PDF
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
PPTX
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
null - The Open Security Community
 
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
PPT
Beyond Automated Testing - RVAsec 2016
Andrew McNicol
 
ODP
Nginx and friends - putting a turbo button on your site
Wim Godden
 
PDF
4069180 Caching Performance Lessons From Facebook
guoqing75
 
PPTX
Ethical hacking 101 - Singapore RSA 2019
Paul Haskell-Dowland
 
PDF
The Web Application Hackers Toolchain
jasonhaddix
 
SOHOpelessly Broken
The Security of Things Forum
 
Pentesting an unfriendly environment: bypassing (un)common defences and mate ...
Sandro Zaccarini
 
Aditya - Hacking Client Side Insecurities - ClubHack2008
ClubHack
 
4 Mapping the Application
Sam Bowne
 
A tale of two proxies
SensePost
 
Hunting Botnets with Zmap
HeadlessZeke
 
08- pen-testing Web applications attacks.pptx
wassimahmad9
 
Google Hacking
Pim Piepers
 
Advanced googling
sonuagain
 
Hackbattle 2013 Walkthrough (Nasty Salon V2)
Munir Njiru
 
Course_Presentation cyber --------------.pptx
ssuser020436
 
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
null - The Open Security Community
 
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
Beyond Automated Testing - RVAsec 2016
Andrew McNicol
 
Nginx and friends - putting a turbo button on your site
Wim Godden
 
4069180 Caching Performance Lessons From Facebook
guoqing75
 
Ethical hacking 101 - Singapore RSA 2019
Paul Haskell-Dowland
 
The Web Application Hackers Toolchain
jasonhaddix
 
Ad

More from Websecurify (12)

PDF
Security Challenges in Node.js
Websecurify
 
PDF
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Websecurify
 
PDF
Unicode - Hacking The International Character System
Websecurify
 
PDF
Next Generation of Web Application Security Tools
Websecurify
 
PDF
Web Application Security 101 - 14 Data Validation
Websecurify
 
PDF
Web Application Security 101 - 12 Logging
Websecurify
 
PDF
Web Application Security 101 - 10 Server Tier
Websecurify
 
PDF
Web Application Security 101 - 07 Session Management
Websecurify
 
PDF
Web Application Security 101 - 06 Authentication
Websecurify
 
PDF
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
PDF
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
PDF
Web Application Security 101 - 02 The Basics
Websecurify
 
Security Challenges in Node.js
Websecurify
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Websecurify
 
Unicode - Hacking The International Character System
Websecurify
 
Next Generation of Web Application Security Tools
Websecurify
 
Web Application Security 101 - 14 Data Validation
Websecurify
 
Web Application Security 101 - 12 Logging
Websecurify
 
Web Application Security 101 - 10 Server Tier
Websecurify
 
Web Application Security 101 - 07 Session Management
Websecurify
 
Web Application Security 101 - 06 Authentication
Websecurify
 
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
Web Application Security 101 - 02 The Basics
Websecurify
 
Ad

Recently uploaded (20)

PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PPTX
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PPTX
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
DOCX
Import Data Form Excel to Tally Services
Tally xperts
 
PDF
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
PDF
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
PPTX
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
PDF
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
PDF
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
PPTX
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
PPTX
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
PDF
Streamline Contractor Lifecycle- TECH EHS Solution
TECH EHS Solution
 
PPTX
Revolutionizing Code Modernization with AI
KrzysztofKkol1
 
PDF
Beyond Binaries: Understanding Diversity and Allyship in a Global Workplace -...
Imma Valls Bernaus
 
PPT
MergeSortfbsjbjsfk sdfik k
RafishaikIT02044
 
PDF
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
Import Data Form Excel to Tally Services
Tally xperts
 
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
Writing Better Code - Helping Developers make Decisions.pptx
Lorraine Steyn
 
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
Streamline Contractor Lifecycle- TECH EHS Solution
TECH EHS Solution
 
Revolutionizing Code Modernization with AI
KrzysztofKkol1
 
Beyond Binaries: Understanding Diversity and Allyship in a Global Workplace -...
Imma Valls Bernaus
 
MergeSortfbsjbjsfk sdfik k
RafishaikIT02044
 
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 

Web Application Security 101 - 05 Enumeration