Web Enumeration

General

Frameworks

Fingerprinting

  • zgrab2
    • WARNING: Installation instructions are super shoddy
      • Clone to /usr/local/src
      • cd /usr/local/src/zgrab2/cmd/zgrab2
      • go build
        • Maybe need to go build the entire thing first?
    • WARNING: May yield false negatives
  • wappalyzer
    • Identify technology on websites
  • findomain
    • Has paid version
  • fingerprintjsopen in new window
    • Browser fingerprinting library

SSL

  • https://github.com/takeshixx/python-ssllabs
  • NSE ssl-cipher-enum

XSS

SQLi

  • sqlmap

LFI

Fuzzing

WAF Bypass

CMS

Java

Java RMI

Notes

TODO: Clean up wording.

What is Java RMI? It's basically an RPC protocol built for the Java ecosystem, typically used by apps to communicate with other apps/components. It isn't necessarily the most modern approach (as opposed to, say, a REST API), but it'll be around for a while (and I'm sure it's better in some usecases).

For JMX endpoints, look for RemoteObject or RMIServer in nmap's output. If the JMXRMI endpoint is unauthenticated, you can get a shell on the system with the exploit/multi/misc/java_jmx_serveropen in new window. Worth noting: the scanner part of this tool may lie.

What's JMX? It's be used to monitor and manage a running JVM (read: fewer restrictions on code we can run!), and it typically uses an RMI connector to communicate with clients, hence the mention.

Resources

Java Debug Wireless Protocol

Just use Metasploit: exploit/multi/misc/java_jdwp_debuggeropen in new window

Misc

Post

Shells

Last Updated: