Content Discovery

18 May 2025 • 1 min read

Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.

Checklist

  • [] Check the robots.txt
  • [] Check favicon against owasp favicon database
  • [] Check sitemap.xml
  • [] Check HTTP Headers with command curl {url} -v
  • [] Check Framework stack either by favicon or by potential comments in source code then see if they use default credentials
  • [] Check google results for dorks that contain sensitive data like admin in content/title
  • [] Check Wappalyzer
  • [] Check wayback machine for deleted pages
  • [] Check github commits
  • [] Check http(s)://{name}.s3.amazonaws.com for saved data
  • [] Automated Discovery
BASH
ffuf -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -u http://url/FUZZ
BASH
dirb http://urk/ /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
BASH
gobuster dir --url http://url/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt

Start searching

Enter keywords to search articles.