Page 53 - Hands-On Bug Hunting for Penetration Testers
P. 53

Preparing for an Engagement                                                 Chapter 3

            As you can tell from the command, we passed in the web-content discovery list from
            SVNDigger with the  X flag,  ID tells the scan to ignore 404 status codes (hide code), and
            then the final argument is the URL we want to target:















































            You can see some interesting points to explore. While the effectiveness of brute-force tools
            is dictated by their wordlists, you can find effective jumping-off points as long as you do
            your research.

            Keep in mind that brute-forcers are very noisy. Only use them against isolated staging/QA
            environments, and only with permission. If your brute-forcer overwhelms a production
            server, it's really no different from a DoS attack.




                                                    [ 38 ]
   48   49   50   51   52   53   54   55   56   57   58