Here I will write all the tips tricks i got from twitter and even advices which when i got from others and daily update this blog post
Bug Hunting Tips 1 [By Jason Haddix] :→
Bug Hunting Tip 2 [By Jason Haddix] :→
Bug Hunting Tips 3 [By Jason Haddix] :→
Check out @BountyBurp - https://github.com/wagiro/BurpBounty/ and @egarme’s port of LinkFinder (by @gerben_javado )
https://github.com/ghsec/BBProfiles/blob/master/PASSIVE-EndpointsExtractor.bb https://www.youtube.com/watch?v=ELftJwkY_e0 https://github.com/GerbenJavado/LinkFinder
I’m gonna run out of good pics of myself!
Don’t Forget ->
Credit -> https://twitter.com/stokfredrik/status/1109733020540567555
I always look up asn and ipranges on ripe, if it’s a small scope or if I just want a feeling for it I run it threw domained/aquatone and sort the sizes of the screen shots to look for anomalies, (link: https://github.com/cak/domained) https://github.com/cak/domained (link: https://github.com/michenriksen/aquatone) https://github.com/michenriksen/aquatone
By @imhaxormad :-> My Recon tips :->
- Wayback machine plugin in burp gives you some sweet endpoints, I had managed to find an RCE via an abandoned test page for a pentest client.
- Look the source code, sometimes you might find an open redirection out of nowhere!
- Run Gobuster+dirb+Burp spider
- sniper tool(everything u need)
- gitrob or similar tools which does the github recon jobs
- shodan and censys
- To find other domains that the target own I use the reverse whois lookup over at (link: http://viewdns.info) viewdns.info.
- I also look at what other domains are on the TLS certificates that have been created for the target domains.
- Use wayback and (link: http://commoncrawl.org) commoncrawl.org
- Google dork - for indexed pages and endpoints
- Dirsearch and gobuster - path/file discovery especially when i run into a 401(not authorized)
- Arjun - discover hidden get/post parameters in urls
- Wayback machine - especially for decommissioned pages but live endpoints
- Also aquatone and amass. Gave a short write about them here :-> https://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/
By @0xINT3 -> What I do:->
- Find all subdomains using tools such as knockpy, sublist3r, amass, aquatone and sort them uniquely in a file.
- Pick a subdomain of your interest and run a burp spider in it with wayback plugin.
- On that subdomain run a directory fuzzing, and find entry points.
By @hossams01284251 :-> My recon tips is :->
focus on the web server bugs as the web application because most of people dont focus on web server
allways dig deeper as much as you can to find juicy bugs
dont depend on the tools 100% allways when work manually for more bugs
Tools : subfinder, massdns + dirsearch / eyewitness Start by finding interesting subdomain, then spider / bruteforce it (i use dirsearch across multiple subdomains). From there start digging more into host for interesting functionality or files.
By @JarPhish :->
- Know your target machine, open port. Find it with wappalyzer/builtwith and nmap/masscan
- Find subdomains, directory, path & parameters with amass, gobuster, Arjun, JSparser
- Find more with google dorks, exploitdb, github.
By @mufeedvh ->
Some Recon Tips:
- Google Dorks: search for common parameters and directories.
- Collect parameters as you surf the target, these parameters may respond in other pages too that you can chain them to get an awesome bug (mainly in account settings).
- Check “robots.txt”.
- Spider to find all end points posible
- Dirb it can give you some interesting pages
- Sub domain search can be helpfull too
Run your tools using VPS servers instead of local for turbo speed
Tweet by Tom Joseph [https://twitter.com/bot_infosec/status/1114035613655654400]
Does Anyone know some good vulnerability based automation scanners?
- SQLMAP => SQL Injection
- Commix => Command Injection
- TPLMAP => SSTI
Others reply ->
By Abhinav [@0xINT3]
Gitrob: GitHub reconnaissance Knockpy: Subdomain lister SAML Raider: SAML (burp plugin) XXEinjector: XXE xsshunter: Blind XSS
I’ll add more. :)
By Rakesh Mane @RakeshMane10
xcat => XPath Injection
- By Arif Khan
- XSStrike by @s0md3v for XSS.
- Photon, Spiderfoot for #OSINT
- Arjun for HTTP parameter discovery
- Aquatone for Recon
By \x43 Kadimus for LFI
- XSSer = XSS