Information Gathering

Conduct Search Engine Discovery and Reconnaissance for Information Leakage

Reference

Fingerprint Web Server

Check the Server header in the response.

Review Webserver Metafiles for Information Leakage

Enumerate Applications on Webserver

Review Webpage Comments and Metadata for Information Leakage

Identify application entry points

Map execution paths through application

Fingerprint Web Application Framework

Fingerprint Web Application

Map Application Architecture