Web Application Enumeration
Overview
Technology Stack Identification
whatweb - Command Line Technology Detection
# Basic scan
whatweb https://example.com
# Aggressive scan with all plugins
whatweb -a 3 https://example.com
# Output to JSON format
whatweb --log-json=results.json https://example.com
# Scan multiple URLs from file
whatweb -i urls.txt
# Scan with specific user agent
whatweb --user-agent "Mozilla/5.0..." https://example.comWappalyzer (Browser Extension)
BuiltWith - Web Technology Profiler
Netcraft - Web Security Services
Nikto - Web Server Scanner
Nmap HTTP Scripts for Technology Detection
Manual Header Analysis
Directory & File Enumeration
Gobuster - Directory Brute Forcing
ffuf - Fast Web Fuzzer
dirb - Recursive Directory Scanner
Virtual Host Discovery
Understanding Virtual Hosts
How Virtual Hosts Work
Types of Virtual Hosting
Type
Description
Advantages
Disadvantages
Example Apache Configuration
gobuster - Virtual Host Enumeration
Basic gobuster vhost Usage
Important gobuster Flags
gobuster vhost Example Output
ffuf - Fast Virtual Host Fuzzing
Basic ffuf Virtual Host Discovery
Advanced ffuf Filtering
feroxbuster - Rust-Based Virtual Host Discovery
Virtual Host Discovery Strategies
1. Preparation Phase
2. Initial Discovery
3. Filtering Setup
4. Comprehensive Enumeration
Manual Virtual Host Testing
Local Testing with /etc/hosts
HTB Academy Lab Examples
Lab: Virtual Host Discovery
Analysis Process
Security Considerations
Detection Avoidance
Traffic Analysis
False Positive Management
Defensive Measures
Server Hardening
Monitoring
Parameter Discovery
ffuf Parameter Fuzzing
Arjun - Parameter Discovery Tool
paramspider - Parameter Mining
API Enumeration
Common API Endpoints
API Fuzzing with ffuf
GraphQL Enumeration
Web Crawling & Spidering
Popular Web Crawlers Overview
ReconSpider - HTB Academy Custom Spider
ReconSpider Results Analysis
Key
Description
Security Relevance
ReconSpider Data Mining
hakrawler - Fast Web Crawler
wget Recursive Download
Burp Suite Spider
OWASP ZAP Spider
Scrapy Custom Spider
Ethical Crawling Practices
Critical Guidelines
Responsible Crawling Configuration
Legal Considerations
Search Engine Discovery (OSINT)
Overview
Search Operators
Operator
Description
Example
Use Case
Advanced Search Operators
Operator
Description
Example
Use Case
Google Dorking Examples
Finding Login Pages
Identifying Exposed Files
Uncovering Configuration Files
Locating Database Backups
Finding Sensitive Information
Directory Listings
Error Pages and Debug Information
Specialized Google Dorks
WordPress-Specific Dorks
Database-Specific Dorks
Version Control Systems
OSINT Tools and Resources
Google Hacking Database
Automated Google Dorking Tools
Search Engine Alternatives
Bing Search Operators
DuckDuckGo Search
Yandex Search
Practical OSINT Workflow
Phase 1: Initial Discovery
Phase 2: Deep Enumeration
Phase 3: Vulnerability Discovery
Phase 4: Intelligence Analysis
Legal and Ethical Considerations
Best Practices
Limitations
Web Archives (Wayback Machine)
Overview
How the Wayback Machine Works
Why Web Archives Matter for Reconnaissance
Critical Applications:
Wayback Machine Usage
Basic Web Interface
URL Format Structure
Advanced Wayback Machine Techniques
Subdomain Discovery
Directory and File Discovery
Technology Evolution Tracking
Automated Wayback Machine Tools
waybackurls - URL Extraction
gau (GetAllURLs)
Wayback Machine Downloader
Historical Intelligence Gathering
Employee and Contact Discovery
Technology Stack Evolution
Sensitive Information Discovery
Manual Investigation Techniques
Timeline Analysis
Content Comparison
HTB Academy Lab Examples
Lab 6: Wayback Machine Investigation
Practical Investigation Workflow
Alternative Web Archives
Archive.today
Common Crawl
Library and Government Archives
Limitations and Considerations
Technical Limitations
Investigation Challenges
Legal and Ethical Guidelines
Best Practices
JavaScript Analysis
LinkFinder - Extract Endpoints from JS
JSFScan.sh - JavaScript File Scanner
Manual JavaScript Analysis
CMS-Specific Enumeration
WordPress
Joomla
Drupal
Security Headers Analysis
Security Headers Check
SSL/TLS Analysis
HTTP Methods Testing
Method Enumeration
robots.txt and Sitemap Analysis
robots.txt Enumeration
Sitemap Discovery
WAF Detection and Bypass
WAF Detection
Basic WAF Bypass Techniques
HTB Academy Lab Examples
Lab 1: Fingerprinting inlanefreight.com
Banner Grabbing with curl
WAF Detection with wafw00f
Comprehensive Scanning with Nikto
Technology Stack Analysis
Lab 2: Virtual Host Discovery
Lab 3: Directory Discovery
Lab 4: ReconSpider Web Crawling
ReconSpider Results Analysis
Lab 5: Search Engine Discovery (OSINT)
OSINT Intelligence Analysis
Automated Reconnaissance Frameworks
Overview
Reconnaissance Frameworks
FinalRecon - All-in-One Python Framework
FinalRecon Command Options
Option
Argument
Description
FinalRecon Advanced Options
Option
Default
Description
FinalRecon Practical Examples
Other Reconnaissance Frameworks
Recon-ng - Modular Framework
theHarvester - OSINT Data Gathering
SpiderFoot - OSINT Automation
OSINT Framework - Tool Collection
Automation Workflow Design
Phase 1: Initial Reconnaissance
Phase 2: Deep Enumeration
Phase 3: Data Analysis
Custom Automation Scripts
Bash Automation Example
Python Automation Example
Tool Integration Strategies
API-Based Integration
Output Standardization
Best Practices for Automation
Performance Optimization
Error Handling
Security Considerations
HTB Academy Lab Examples
Lab 7: FinalRecon Automation
Automation Workflow Example
Security Assessment
Vulnerability Indicators
Common Misconfigurations
Defensive Measures
Web Application Hardening
Monitoring and Detection
Tools Summary
Tool
Purpose
Best Use Case
Key Takeaways
References
Last updated