Enumeration

Google Dorks

"Info:<url>"
site:<url>
site:<url> -inurl:https
site:<url> -filetype: .
site:<url> filetype:Log allintext:"username" "password"
site:<url> ext:pdf

Social media

<query> @<facebook|twitter|linkedin...>

Specific dorks

SOAP WSDL file

inurl:wsdl
filetype:wsdl

SQL Dump

"index of" "database.sql.zip" 

FTP server

Wordpress admin page

Apache2

PHPMyAdmin

JIRA/Kibana

cPanel password reset

Site analysis

WhatWeb

Advanced web scanner and spider tool. Download from here.

Use with proxy

Plugins

Nikto

Check for page formats

Dumping certificates

Create own certificate

Create and sign a certificate from a given Certificate Authority and private .pem key. After creation import the certificate in your browser.

SOAP Services

SOAP services expose a WSDL file that can reveal all the possible calls and relative parameters that can be executed on the server. This can allow an attacker to execute arbitrary calls to server-side services to tamper or destroy data

In order to find the definition file try appending the following payloads to the service url

Some public web services may have their WSDL file accessible by visiting soapclient.com

Git repository

If you happen to find a .git folder on a server, you can dump all the files in the repository even if not directly accessible (403 error) with the following tool: https://github.com/arthaud/git-dumper

Last updated