Definitions
Web Fuzzing is a method to finding some invisible stuff :D
Iseng-iseng aja sebenere (nganggur), dan mungkin android hacking ini salah satu yg blm pernah kuexplore langsung, palingan cmn pernah main CTF challenge, itupun cmn static analysis, so ya pgn nyoba deepdive aja.
Open Virtual Devices Manager, click + Button, then choose Android type (i choose Small phone), then choose Android API version (i choose API 36), then click finish.
nmap -A <target> -oN scan.initial (quick service & version scan)nmap -p- -A <target> -T4 -oN scan.full (full-port TCP)nmap -p- -sU --top-ports 200 <target> -oN scan.udp (top UDP)nc -nv <target> 80 (then type HEAD / HTTP/1.0)curl -sv http://<target>/ -o /dev/nullopenssl s_client -connect <target>:443 -servername <target> | headsearchsploit "Apache Tomcat 7.0.88"searchsploit --nmap scan.initial"<service> <version> exploit"whatweb -a 3 http://<target>httpx -tech-detect -title -status -ip -o tech.txtffuf -u http://<target> -H "Host: FUZZ.<target>" -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -fs 4242feroxbuster --vhost -u http://<target> -w subdomains.txtffuf -u http://<target>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt -mc 200,204,301,302,307,401,403dirsearch -u http://<target> -e php,txt,bakarjun -u http://<target>/search.phpparamspider -d <target-domain>test' "$IFS$(id) etc.wfuzz -u http://<target>/page.php?id=FUZZ -w /usr/share/wordlists/others/sql.txt --hc 404wpscan --url http://<target> --enumerate ap,at,tt,u --api-token <token>droopescan scan drupal -u http://<target>joomscan --url http://<target>searchsploit -m 49283 (download exploit)msfconsole -q → search CVE-2021-41773 → use exploit/multi/http/apache_path_traversalcrackmapexec smb <target> -u users.txt -p "Summer2024"hydra -L users.txt -P /usr/share/wordlists/rockyou.txt ssh://<target>john --wordlist=rockyou.txt hash.txtwhoami # Windows: whoami /all
id # Linux
sudo -l # Linux
systeminfo # Windows OS & patch level
uname -a # Linux kernelcat /etc/passwd | net user /domaingroups | whoami /groupsenv / printenv | setfind / -perm -4000 -type f 2>/dev/null # SUIDs
grep -Ri "password" /home /opt 2>/dev/null # creds
ls -la /root /home/*/.*_history # historiescat ~/.ssh/id_rsareg save HKLM\\\\SAM sam + reg save HKLM\\\\SYSTEM system./linpeas.sh -a | winpeas.exe cmd > winpeas.txt./pspy64 (watch cron / processes)systemctl list-units --type=service (Linux)sc queryex type=service / wmic service get name,pathname,startmode (Windows)uname -r → if < 4.8 consider DirtyCow (searchsploit dirtycow)windows-exploit-suggester.py --systeminfo systeminfo.txt (classic)If you spot sudo NOPASSWD, consult GTFOBins.