the first steep in process of attacking the application is gathering and some key information about it to gain a better understanding what are you up against. the mapping exercise begins by enumerating the application content and functionality to understand what the web application does and how it behaves. much of this functionality is easy to identify, but some of it maybe hidden, requiring a degree of guesswork and lucky discover.
- Enumerating Content and Functionality
as shown below :
we can also identified some functionality via manual browsing as shown below
however to perform a rigorous inspection of the enumerate content, and to obtain comprehensive record of everything of identified, you must employ more advance techniques then simple browsing. but you can also identified the content of application via robots.txt like picture shown below :
- Web Spidering
burp suite is one of several tools that have been provided. find how to use burp spider with yourself from here
- Brute-Force Techniques
look the picture below how dirbuster work :
thanks..!!!!
Tidak ada komentar:
Posting Komentar