Web Enumeration Flashcards

1
Q

Gobuster is used for website enumeration of what two things?

A
  1. File/directories.
  2. Subdomains
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gobuster flag mode for enumerating URL directories and files

A

Dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gobuster syntax for enumerating directories and files for a website

A

gobuster dir -u (url) -w (wordlist.txt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gobuster flag mode for enumerating URL subdomains

A

dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Gobuster syntax for enumerating URL subdomains

A

gobuster dns -d (domain) -w (wordlist.txt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a popular GitHub repo that contains useful lists for fuzzing and exploitation.

A

/danielmiessler/SecLists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to download and install the SecLists Gthub repo?

A

git clone https://github.com/danielmiessler/SecLists

sudo apt install seclists -y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using Gobuster to enumerate a subdomain. Where do we add a live DNS server i.e. 1.1.1.1?

A

/etc/resolv.conf file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Curl command syntax for banner grabbing

A

curl -IL https://URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A handy tool that takes screenshots of the target web application, fingerprints them, and identify possible default credentials.

A

EyeWitness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Extracts the version of webservers, supporting frameworks and applications. We can use this info to pinpoint technologies in use and begin searching for potential vulnerabilities.

A

Whatweb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whatweb syntax for enumerating

A

Whatweb (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What info can we get from SSL/TLS certificates

A

Email address and company name and use this to do a phishing attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This file is used to instruct search engine web crawlers on which resource should and should not be indexed into a search engine.

A

robots.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shortcut to bring up the source code window in browser.

A

[CTRL + U]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly