OSCP Learning Notes Enumeration(2)

HTTP Enumeration

Target Host IP: 10.0.0.20

Brute Forcing using DirBuster

1. Start the dirbuster and set the options.

Note:

  1. The wordlist can be found locally or downloaded from the Internet.   

    

   OR  Dirbuster-ng big wordlist dowload site:https://github.com/digination/dirbuster-ng/tree/master/wordlists

2. Progress in sacanning.

3. Scan result tree. We may find some interesting things here.

4.Open the test.php in browser, and review the source code.

 Brute Forcing using nikto

1. Scan the target port 80(http).

nikto -h 10.0.0.20

2. Scan the target port 443(https).

nikto -h 10.0.0.20:443

相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
原文地址:https://www.cnblogs.com/keepmoving1113/p/11070336.html