Module 3: Web Application Enumeration Methodology
Web Application Reconnaissance
Determine the Scope
Passive Information Gathering
Web Application Enumeration
Accessing the Enumeration Sandbox Application
Discovering Running Services
Banner Grabbing
Manual HTTP Endpoint Discovery
Automated HTTP Endpoint Discovery
Information Disclosure


Components with Vulnerabilities
Sourcing Wordlists
Common Wordlists
Creating Custom Wordlists
Types of Attacks
Authentication Bypass
Data Exfiltration
Remote Code Execution
Web Shells
Appendix
Last updated