Page 53 - Hands-On Bug Hunting for Penetration Testers
P. 53
Preparing for an Engagement Chapter 3
As you can tell from the command, we passed in the web-content discovery list from
SVNDigger with the X flag, ID tells the scan to ignore 404 status codes (hide code), and
then the final argument is the URL we want to target:
You can see some interesting points to explore. While the effectiveness of brute-force tools
is dictated by their wordlists, you can find effective jumping-off points as long as you do
your research.
Keep in mind that brute-forcers are very noisy. Only use them against isolated staging/QA
environments, and only with permission. If your brute-forcer overwhelms a production
server, it's really no different from a DoS attack.
[ 38 ]