Wordlist Scanning

Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. Wordlists used in these scans may contain generic, commonly used names and file extensions or terms specific to a particular software. Adversaries may also create custom, target-specific wordlists using data gathered from other Reconnaissance techniques.

Techniques scanning on target domain including:

Techniques scanning on sub domain including custom wordlist:

  • sub-dev.domain.com

  • sub-uat.domain.com

  • subuat.domain.com

  • sub-pre.domain.com

  • subdr.domain.com

  • sub-api.domain.com

Tools:

Last updated