PRIMARY CATEGORY → PROTOCOLS AND SERVICES
MANDATORY READ
Go here to see all the information related to Pentesting Web
Enumeration
Banner Grabbing
Netcat
nc -nv <TARGET> <PORT> <<< ""
HTTP Headers Analysis
Curl
curl --silent --request GET --location --head "<URL>"
Known Web Files
Robots.txt
curl --silent --request GET --location "http[s]://<TARGET>[:<PORT>]/robots.txt"
Web Technologies
Whatweb
whatweb <URL>
whatweb --verbose <URL> # Verbose Mode
WAF Check
Wafw00f
wafw00f --verbose --findall <URL>
Crawlers
ReconSpider (HTB)
curl --silent --request GET --location "https://academy.hackthebox.com/storage/modules/144/ReconSpider.v1.2.zip" --output ReconSpider.zip
unzip !$ && pip3 install scrapy
python3 ReconSpyder.py <URL>