4.2 Configuration and Deployment Management Testing

Once obtained all the services that composes the application such as MySQL, APIs, different domains, etc. then:

Evidence:

​

ffuf -ac -w /usr/share/wordlists/SecLists/Discovery/Web-Content/raft-medium-files-lowercase.txt -u https://<DOMAIN>/FUZZ -e .bak,.config,.old,.txt,.pdf,cgi -of md -o conf_files.md

Evidence:

​

Check:

Evidence:

Identify hidden administrator interfaces, functionality, cookies, etc.

List of default web page:

Evidence:

Evidence:

Evidence:

Evidence:

Evidence:

A subdomain of the company is pointing to a third-party service with a name not registered. If you can create an account in this third party service and register the name being in use, you can perform the subdomain takeover.

  1. Go to Burp's sitemap, select all the domains that has been found using the app, right click "Copy select URLs" and saved them into a file

  2. Then perform an HTTP request to all the domains looking for a domain that returns a 404.

  1. Check if the domain exists or not (look for the URL on burp), and if it can be registered by a malicious attacker.

Evidence:

Evidence:

Last updated