Enumeration
beginner- Bruteโforcing directories
๐ Using dirb
dirb example.com /usr/share/wordlists/dirb/common.txt
๐ Using gobuster
gobuster dir -u http://verbal-sleep.picoctf.net:52452/ -w /usr/share/wordlists/dirb/common.txt
โก Using ffuf ffuf -u http://verbal-sleep.picoctf.net:52452/FUZZ -w /usr/share/wordlists/dirb/common.txt
- Fingerprinting the web tech stack
โ Using whatweb whatweb http://verbal-sleep.picoctf.net:52452/
๐ง Using nikto nikto -h http://verbal-sleep.picoctf.net:52452/
MORE TO DEVELOP:
Full Web Enum Bash Script #!/bin/bash
Title: Web Enum Scanner
Usage: ./web_enum.sh http://target:port/
if [ -z "$1" ]; then
echo "Usage: $0 <URL>"
echo "Example: $0 http://example.com:8080/"
exit 1
fi
TARGET="$1"
WORDLIST="/usr/share/wordlists/dirb/common.txt"
echo -e "\n๐ Target: $TARGET"
echo "๐
Scan started: $(date)"
echo "----------------------------------------"
# 1. Ping check
echo -e "\n๐ Checking if host is reachable..."
HOST=$(echo "$TARGET" | awk -F[/:] '{print $4}')
ping -c 2 "$HOST" > /dev/null 2>&1 && echo "โ
Host is reachable." || echo "โ ๏ธ Host is not responding to ping."
# 2. whatweb scan
echo -e "\n๐ง Running whatweb..."
whatweb "$TARGET"
# 3. gobuster scan
echo -e "\n๐ Running directory brute-force with gobuster..."
gobuster dir -u "$TARGET" -w "$WORDLIST" -t 30 -q -o gobuster_results.txt
echo "โก๏ธ Gobuster Results:"
cat gobuster_results.txt | grep -v "Status: 404"
# 4. nikto scan
echo -e "\n๐ก๏ธ Running nikto vulnerability scan..."
nikto -h "$TARGET"
echo -e "\nโ
Enumeration Complete: $(date)"
echo "----------------------------------------"