Wordlist Scanning
Last updated
Last updated
Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. Wordlists used in these scans may contain generic, commonly used names and file extensions or terms specific to a particular software. Adversaries may also create custom, target-specific wordlists using data gathered from other Reconnaissance techniques.
Techniques scanning on target domain including:
Fuzzing binary files name
Fuzzing directory
Fuzzing parameter
Fuzzing ID number
Techniques scanning on sub domain including custom wordlist:
sub-dev.domain.com
sub-uat.domain.com
subuat.domain.com
sub-pre.domain.com
subdr.domain.com
sub-api.domain.com
Tools:
Dirb
Dirbuster
Gobuster
ffuf