PRIMARY CATEGORY → PROTOCOLS AND SERVICES
MANDATORY READ
Go here to see all the information related to Pentesting Web
Enumeration
Banner Grabbing
Netcat
nc -nv <TARGET> <PORT> <<< ""HTTP Headers Analysis
Curl
curl --silent --request GET --location --head "<URL>"Known Web Files
Robots.txt
curl --silent --request GET --location "http[s]://<TARGET>[:<PORT>]/robots.txt"Web Technologies
Whatweb
whatweb <URL>
whatweb --verbose <URL> # Verbose ModeWAF Check
Wafw00f
wafw00f --verbose --findall <URL>Crawlers
ReconSpider (HTB)
curl --silent --request GET --location "https://academy.hackthebox.com/storage/modules/144/ReconSpider.v1.2.zip" --output ReconSpider.zipunzip !$ && pip3 install scrapypython3 ReconSpyder.py <URL>