Web Enumeration
Overview
Web services are the most common attack surface in penetration testing. HTTP/HTTPS enumeration targets technology identification, directory and file discovery, virtual host enumeration, CMS detection, and TLS configuration analysis. Thorough web enumeration frequently reveals the initial foothold — exposed admin panels, backup files, WebDAV write access, or misconfigured authentication.
Topics in This Section
- HTTP Enumeration — Banner grabbing, directory brute-forcing, CMS detection, nikto, gobuster, feroxbuster, ffuf
- HTTPS / TLS Enumeration — Certificate inspection, cipher suite analysis, protocol testing, sslscan, sslyze
- WebDAV Enumeration — File upload testing, davtest, cadaver, PROPFIND/PUT/MOVE operations
- WebSocket Enumeration — WebSocket detection, message interception, websocat, Burp Suite
General Approach
- Service detection — Nmap version scan to identify web server software and version
- Technology fingerprinting — whatweb, wafw00f to identify CMS, frameworks, WAFs
- TLS analysis — Certificate SANs for additional hostnames, cipher/protocol checks
- Content discovery — Directory/file brute-forcing with multiple wordlists and tools
- Virtual host enumeration — Discover additional sites hosted on the same server
- CMS enumeration — wpscan for WordPress, specialized tools for Drupal/Joomla
- Application scanning — nikto for misconfigurations and known vulnerabilities
- Manual review — robots.txt, source code, JavaScript files, API endpoints
For web application attack techniques (injection, XSS, file inclusion, etc.), see 04-web-testing/.