HTTP
Hypertext transfer protocol (port 80)
cmds to enum info
whatweb $IP
http $IP
dirb http://$IP/
browsh --startup-url $URL #outputs on terminal all that you'll see on browsernmap
nmap -sC -sV $IP -p80 --script http-enumfor http headers
nmap -sC -sV $IP -p80 --script http-headershttp methods enum
nmap -sC -sV $IP -p80 --script http-methods \
--script-args http-methods.url-path=/directory/http webdav scan
nmap -sC -sV $IP -p80 --script http-webdav-scan \
--script-args http-methods.url-path=/directory/----------- everything that the course provide for http (nmap) can be done with -sC scan ^^
dir bruteforcing
for directory bruteforcing using we can use gobuster or ffuf or any other tool
ffuf
ffuf -w /path/to/wordlists/ -u http://$IP/FUZZ -ac #ac just to filter out repeated stuff gobuster
gobuster dir -w /path/to/wordlists/ -u http://$IP/FUZZ -accheck robots.txt
curl http://$IP/robots.txt Last updated