eJPT
  • 👋Welcome
  • Tools
    • 🔭Escaneo y Enumeración
  • SECTION 1: Assessment Methodologies
    • Assessment Methodologies: Information Gathering
      • Introducción a la Recopilación de Información
        • Start Quiz
      • Passive Information Gathering
      • Active Information Gathering
    • Assessment Methodologies: Footprinting & Scanning
      • Introduction
      • Networking Primer
      • Host Discovery
      • Port Scanning
      • Evasion, Scan Performance & Output
      • Page
      • Challenges
    • Assessment Methodologies: Enumeration
      • Overview
      • SMB Lesson
      • FTP Lesson
      • SSH Lesson
      • HTTP Lesson
      • SQL Lesson
    • Assessment Methodologies: Vulnerability Assessment
      • Vulnerability Assessment
      • Course Labs
  • SECTION 2: Host & Networking Auditing
    • Assessment Methodologies: Auditing Fundamentals
      • Assessment Methodologies
      • Practice
  • SECTION 3: Host & Network Penetration Testing
    • Host & Network Penetration Testing: System/Host Based Attacks
      • Introduction to Attacks
      • Windows Vulnerabilities
      • Exploiting Windows Vulnerabilities
      • Windows Privilege Escalation
      • Windows File System Vulnerabilities
      • Windows Credential Dumping
      • Linux Vulnerabilities
      • Exploiting Linux Vulnerabilities
      • Linux Privilege Escalation
      • Linux Credential Dumping
      • Conclusion
    • Host & Network Penetration Testing: Network-Based Attacks
      • Network-Based Attacks
    • Host & Network Penetration Testing: The Metasploit Framework (MSF)
      • Metasploit
        • Metasploit Fundamentals
      • Information Gathering & Enumeration
        • Nmap
        • Enumeration
      • Vulnerability Scanning
        • MSF
        • Nessus
        • Web Apps
      • Client-Side Attacks
        • Payloads
        • Automating
      • Exploitation
        • Windows Exploitation
        • Linux Exploitation
        • Post Exploitation Fundamentals
        • Windows Post Exploitation
        • Linux Post Exploitation
      • Armitage
        • Metasploit GUIs
    • Host & Network Penetration Testing: Exploitation
      • Introduction To Exploitation
      • Vulnerability Scanning Overview
      • Exploits
        • Searching For Exploits
        • Fixing Exploits
      • Shells
      • Frameworks
      • Windows
      • Linux
      • Obfuscation
    • Host & Network Penetration Testing: Post-Exploitation
      • Introduction
      • Windows Enumeration
      • Linux Enumeration
      • Transferring Files
      • Shells
      • Escalation
        • Windows Privilege Escalation
        • Linux Privilege Escalation
      • Persistence
        • Windows Persistence
        • Linux Persistence
      • Dumping & Cracking
        • Windows Password Hashes
        • Linux Password Hashes
      • Pivoting Lesson
      • Clearing
  • Host & Network Penetration Testing: Social Engineering
    • Social Engineering
  • SECTION 4: Web Application Penetration Testing
    • Introduction to the Web & HTTP Protocol
      • Web Applications
      • HTTP Protocol
        • HTTP/S Protocol Fundamentals
        • Website Crawling & Spidering
Powered by GitBook
On this page
  • HTTP IIS
  • HTTP IIS Nmap Scripts
  • HTTP Apache
  1. SECTION 1: Assessment Methodologies
  2. Assessment Methodologies: Enumeration

HTTP Lesson

HTTP IIS

El protocolo HTTP, es un sitio web en donde se puede realizar escaneos internos o como externos.

Asi que realizaremos un scnaeo nmap, en donde se debe de identificar el puerto del servicio http del sitio web.

nmap <Target>
nmap <Target> -sV -O
# Informacion del Servidor
whatweb <Target>
# Para identificar alguna vulnerabilidad a nivel de codigo
http <Target>
# Para buscar sub directorios
dirb http://<Target># 
# Realizara una enumeracion de sitios web basada en una URL en su CLI
browsh -startup-url http://<Target>

HTTP IIS Nmap Scripts

Se utilizara scripts para la enumeracion a profundidad de sitio http

nmap <Target>
nmap <Target> -sV
nmap <Target> -sV -p80 --script http-enum
nmap <Target> -sV -p80 --script http-headers
 nmap <Target> -sV -p80 --script http-methods --script-args http-methods.url-path=<Directorio/ruta>
// Some code nmap <Target> -sV -p80 --script http-webdav-scan --script-args http-methods.url-path=<Directorio/ruta>

HTTP Apache

nmap <Target>
nmap <Target> -p80 -sV
# Debemos recibir una respuesta del servidor, en donde se detalla sus caracteristicas
nmap <Target> -p80 -sV --script banner
#Tambien se puede utilizar metasploit para enumerar
msfconsole
use auxiliary/scanner/http/http_version
set rhosts <Target>
options
run
curl <Target> | more
wget "http://<Target>/index"
# Descargara un archivo y debera de buscar alguna vulnerabilidad a nivel de codigo
cat <File> | more
# Por CLI mostrara lo que aparece en el sitio web
browsh --startup-url <Target>
# Para que te muestre solo texto y realizar el analsis del sitio web
lynx http://<Target>
# DIRS, serve para encontrar directorios detras del sitio web
msfconsole
use /auxiliary/scanner/http/brute_dirs
show options
set RHOST <Target>
options
exploit
exit
dirb http://<Target> /usr/share/metasploit-framework/data/wordlist/directory.txt
msfconsole
use /auxiliary/scanner/http/robots_txt
show options
set RHOST <Target>
options
run

PreviousSSH LessonNextSQL Lesson

Last updated 1 year ago