Crawling#
Katana#
ProjectDiscoverytool. See ProjectDiscovery Tools
Crawl and parse js files for more endpoints
katana -u domain.name -jsl
cat dpmains.txt | katana -jsl -kf all -td -d 10ReconSpider#
See Reconspider This tool crawl and parse html comments, links, emails, etc
python3 ./reconspider.py http://domain.nameVhost enumeration (No DNS)#
Brute force subdomains, no DNS. For CTF, not real bug bounty
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/bitquark-subdomains-top100000.txt:FUZZ -u http://$target/ -H "Host: FUZZ.$target_domain"gobuster vhost -k -t 12 --append-domain -u http://inlanefreight.htb -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txtSubpath (directory/file) enumeration#
gobuster dir -u http://$target/ -w /usr/share/seclists/Discovery/Web-Content/common.txtffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt:FUZZ -u http://$target/FUZZ