Enumeration

beginner
enumeration recon information-gathering
  1. Bruteโ€‘forcing directories

๐ŸŒ Using dirb

dirb example.com /usr/share/wordlists/dirb/common.txt

๐Ÿš€ Using gobuster

gobuster dir -u http://verbal-sleep.picoctf.net:52452/ -w /usr/share/wordlists/dirb/common.txt

โšก Using ffuf ffuf -u http://verbal-sleep.picoctf.net:52452/FUZZ -w /usr/share/wordlists/dirb/common.txt

  1. Fingerprinting the web tech stack

โ“ Using whatweb whatweb http://verbal-sleep.picoctf.net:52452/

๐Ÿšง Using nikto nikto -h http://verbal-sleep.picoctf.net:52452/

MORE TO DEVELOP:

Full Web Enum Bash Script #!/bin/bash

Title: Web Enum Scanner

Usage: ./web_enum.sh http://target:port/

if [ -z "$1" ]; then echo "Usage: $0 <URL>" echo "Example: $0 http://example.com:8080/" exit 1 fi

TARGET="$1" WORDLIST="/usr/share/wordlists/dirb/common.txt"

echo -e "\n๐ŸŒ Target: $TARGET" echo "๐Ÿ“… Scan started: $(date)" echo "----------------------------------------"

# 1. Ping check echo -e "\n๐Ÿ” Checking if host is reachable..." HOST=$(echo "$TARGET" | awk -F[/:] '{print $4}') ping -c 2 "$HOST" > /dev/null 2>&1 && echo "โœ… Host is reachable." || echo "โš ๏ธ Host is not responding to ping."

# 2. whatweb scan echo -e "\n๐Ÿง  Running whatweb..." whatweb "$TARGET"

# 3. gobuster scan echo -e "\n๐Ÿ“ Running directory brute-force with gobuster..." gobuster dir -u "$TARGET" -w "$WORDLIST" -t 30 -q -o gobuster_results.txt

echo "โžก๏ธ Gobuster Results:" cat gobuster_results.txt | grep -v "Status: 404"

# 4. nikto scan echo -e "\n๐Ÿ›ก๏ธ Running nikto vulnerability scan..." nikto -h "$TARGET"

echo -e "\nโœ… Enumeration Complete: $(date)" echo "----------------------------------------"