Recon

Recon0

https://hackycorp.com/robots.txt

Recon1

https://hackycorp.com/team.html

Recon2

dirsearch  -u https://hackycorp.com/ 

Recon3

test manual

1.View page source

i found dir name /images

Using dirsearsh

dirsearch  -u https://hackycorp.com/ 

Recon4

Very eazzzzzz

Recon5

wfuzz -c -z file,/usr/share/wordlists/wfuzz/general/common.txt --hc 404  https://hackycorp.com/FUZZ

I Found /startpage

Recon6

 curl https://hackycorp.com/ -v 
http://51.158.147.132/

Recon7

default virtual host ("vhost") over TLS.

https://51.158.147.132/

Recon8

open certificate is valid

go to details

https://66177e3f25e3ea0713807b1dc5f0b9df.hackycorp.com/

Recon9

i use socat + openssl connection

socat - openssl:51.158.147.132:443,verify=0
wite GET 

Recon10

for i in {1..150}; do printf  " 0x%02x.a.hackycorp.com\n" $i >> hosts.txt;done

Recon11

FUFF

ffuf -w /usr/share/wordlists/wfuzz/general/common.txt -u  http://hackycorp.com/ -H "HOST: FUZZ.hackycorp.com"

Last updated