Content Discovery
18 May 2025
• 1 min read
Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.
Checklist
- [] Check the
robots.txt - [] Check favicon against owasp favicon database
- [] Check
sitemap.xml - [] Check HTTP Headers with command
curl {url} -v - [] Check Framework stack either by favicon or by potential comments in source code then see if they use default credentials
- [] Check google results for dorks that contain sensitive data like
adminin content/title - [] Check Wappalyzer
- [] Check wayback machine for deleted pages
- [] Check github commits
- [] Check http(s)://{name}.s3.amazonaws.com for saved data
- [] Automated Discovery
BASH
ffuf -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -u http://url/FUZZ
BASH
dirb http://urk/ /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
BASH
gobuster dir --url http://url/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt