# 1. Footprint the Web Infrastructure

## 1. Web Applications recon using Nmap and telnet

```
sudo nmap -vv -A -T4 certifiedhacker.com  //aggressive scan
```

```
telnet certifiedhacker.com 80
```

## <mark style="color:red;">2. Web Applications recon using Whatweb</mark>

```
whatweb -v certifiedhacker.com  //verbose information
```

## 3. Web spidering using ZAP

Launch an automated scan and go to the spidering tab to view pages.

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FUmK5QV7CKPABi9mcSGLw%2Fimage.png?alt=media&#x26;token=ae82f02e-54a3-4e09-a89d-bd8230faee32" alt=""><figcaption></figcaption></figure>

## <mark style="color:red;">4. Detect Load Balancers using various tools</mark>

**dig (you get multiple IPs)**

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FB9ZSBIYmtMZNlJe67M29%2Fimage.png?alt=media&#x26;token=63cb7407-63e3-424c-8197-de262a801dd8" alt=""><figcaption></figcaption></figure>

**lbd**

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FCqLheIG5JjOYupBGUq6f%2Fimage.png?alt=media&#x26;token=018b266c-eafe-4bcd-85b9-8bdfbc897f30" alt=""><figcaption></figcaption></figure>

## <mark style="color:red;">5. Identify webserver directories</mark>

{% embed url="<https://youtu.be/S18tDmSIC1E>" %}

**Nmap**

```
nmap -sV --script http-enum certifiedhacker.com
```

**gobuster**

```
gobuster dir -u certifiedhacker.com -w /usr/share/worlists/WORDLIST
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FiQuf3iSXH1OT1tIJTbHR%2Fimage.png?alt=media&#x26;token=d5943686-c03f-4845-a0e9-3a21fd36846c" alt=""><figcaption></figcaption></figure>

**dirsearch**

{% embed url="<https://www.kali.org/tools/dirsearch/>" %}

{% embed url="<https://www.youtube.com/watch?v=eIrtjfdqAWE&t=12s>" %}
Example dirbusting
{% endembed %}

## <mark style="color:red;">6. Vulnerability scanning using Vega</mark>

{% embed url="<https://subgraph.com/vega/>" %}

## <mark style="color:red;">7. Identify Clickjacking using Clickjackpoc</mark>

{% embed url="<https://github.com/Raiders0786/ClickjackPoc>" %}

```
python3 clickJackPoc.py -f domains.txt \\save domain in a file
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FK0oV9gcOI5gPXjFeNiIt%2Fimage.png?alt=media&#x26;token=6aad71d1-683e-42d7-9073-9a0db0efb49c" alt=""><figcaption></figcaption></figure>

## 8. Perform Web Application Vulnerability Scanning using SmartScanner

{% embed url="<https://www.thesmartscanner.com/>" %}

### Best CEH practical Course

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
