Crawling#

Katana#

ProjectDiscovery tool. See ProjectDiscovery Tools

Crawl and parse js files for more endpoints

katana -u domain.name -jsl
cat dpmains.txt | katana -jsl -kf all -td -d 10

ReconSpider#

See Reconspider This tool crawl and parse html comments, links, emails, etc

python3 ./reconspider.py http://domain.name

Vhost enumeration (No DNS)#

Brute force subdomains, no DNS. For CTF, not real bug bounty

ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/bitquark-subdomains-top100000.txt:FUZZ -u http://$target/ -H "Host: FUZZ.$target_domain"
gobuster vhost -k -t 12 --append-domain -u http://inlanefreight.htb -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt

Subpath (directory/file) enumeration#

gobuster dir -u http://$target/ -w /usr/share/seclists/Discovery/Web-Content/common.txt
ffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt:FUZZ -u http://$target/FUZZ