This section contains a checklist for initial recon of the target
# Check firewalls via wafw00fwafw00ftarget.local
# FTP connect commandftptarget.tld# FTP login as Anonymous------------------------# SMB Enumerationenum4linuxtarget.local|teereport.txt# SMB List sharessmbclient-L \\\\target.local# SMB Connect to a sharesmbclient \\target.local\sharename-uusername
# Start a nikto sessionnikto-htarget.local-c
# Use Gobustergobusterdir--no-error-t50-utarget.tld-w $direnumCombined# Use feroxferoxbuster-s $feroxStatusCodes -t50--timeout15-utarget.tld-w $direnumCombined -e# Using Dirsearchdirsearch-r-utarget.tld-t50-w $direnumCombined
# Using hydra to brute force with found usernameshydra-Lusername.txt-P $passrockyou -t16-fssh://target.local
# For wordpress usewpscan-utarget.local# for drupal or joomla use droopescandroopescanscandrupal/joomla-utarget.local--enumerate-plugins# Use Vulnx to get more information on exploitable CMS# Parameters :# -d : get subdomain information# -D : use dorks available on the internet# --dns : dns information gathering# -w : web information gathering# -t : threadsvulnx-utarget.tld-d-D-w--dns-t50--output/output