Word lists, Dictionary Files, Attack Strings, Miscellaneous Datasets and Proof-of-Concept Test Cases With a Collection of Tools for Penetration Testers
- Introduction to Tools in
werdlists
- Hostname Discovery
- Forced Browsing
- Username Enumeration
- Password Cracking
- Attack Proxies
A major benefit of the data sets distributed with werdlists
is that they can be utilized with security testing tools to increase the chances
that positive results will be returned from a penetration tester's reconaissance procedures. The names of the tool categories below have been
purposefully ordered to reflect the order in which they might be used during the course of a pen test. Many word list files in the werdlists
repository were either created for or are distributed with a tool that fulfills one of the purposes in the sections below:
Host name enumeration and enumeration of other information from the DNS protocol are exercises carried out in the early phases of a network test. Although resolving domain names may seem like a simplistic operation to the uninitiated, it actually has such a number of complexities that one can almost never claim they've completely downloaded all available info from a particular name server without dynamic updates and zone transfers. scenario. Therefore, having detailed wordlists and tools with speedy execution are keys to success.
Tool Name | Description of Utility |
---|---|
subdomain3 | 📧 |
megplus | |
OWASP Amass | |
subDomainsBrute | |
massdns | |
[ |
Tool Name | Description of Utility |
---|---|
pathgro | 📧 |
dirb | |
nikto | |
Dir-Xcan | |
OpenDoor | |
dirsearch | |
gobuster | |
pathbrute | |
DeepSearch | |
[] |
Once a particular service is known, a pen tester should be keen on attacking its remote access control--particularly authentication. It is highly likely that a username/password combination is required. Therefore, enumeration of user names will be a handy ability. The names of common system accounts and even common human accounts will be especially helpful at this point.
Tool Name | Description of Utility |
---|---|
usernamer | 📧 |
When an account has been singled out for attack and it uses password authentication, then very often the next step is cracking that account's
password itself or the cipher-text version of it. Testers will probably benefit from the data provided by werdlists
in a scenario such as
cracking a password online via brute-force search against a network daemon. The wordlist files stored in the folders passes-dicts
and
passes-sites
were invented specifically for such a purpose.
Tool Name | Description of Utility |
---|---|
hashcat | 📧 |
John The Ripper 📧 |
HTTP attack proxies are indispensable tools for anyone involved in web application penetration testing.
Tool Name | Description of Utility |
---|---|
Burp Suite | 📧 |
OWASP ZAP | 🎨 |
Fiddler | 🔬 |
Charles | 🚪 |
James | 📜 |