-
RECON
- STUDY THE PROGRAM
- #1 - Understand the terms:
- (a) Write down all (sub)domains in and out of scope;
- (b) Understand which types of vulnerabilities are considered valid or not for reports.
- #2 - Understand the application:
- (a) What this web application does; (b) How the AAA work in the application.
- #3 - Read and study some vulnerabilities that has already have been reported in the program.
- #1 - Understand the terms:
- STUDY THE PROGRAM
-
SUBDOMAIN ENUMERATION
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Alternative Docker PRUNE command for older Docker API versions. | |
| # Colored & Bolded version | |
| # Color codes | |
| BOLD=$(tput bold) | |
| GREEN=$(tput setaf 2) | |
| RED=$(tput setaf 1) | |
| RESET=$(tput sgr0) |