Page cover

recon/technologies

Web Framework

Blazor

Checklist
Description
File / Path

Accessibility of blazor.boot.json

Check if the blazor.boot.json file is accessible. This file may contain secrets or sensitive information.

_framework/blazor.boot.json

Review of Loaded Resources in the Browser

Inspect the loaded resources, especially DLL assemblies, to gather sensitive information using disassemblers.

_framework/*.dll

Navigation Routes

Check how routes are managed in Blazor and look for hidden or undocumented routes.

Inspect routing files like App.razor

Decompilation of Blazor WebAssembly (WASM)

Review downloaded WASM assemblies to ensure they do not contain secrets or critical information.

_framework/*.wasm

CMS (Content Management System)

WordPress

SharePoint

Checklist
Description
File / Path

FrontPage Config Information

Check if the configuration information is available.

/_vti_inf.html

Frontpage Directory Permissions

Check the access permissions of the main FrontPage directories. Ensure that they are properly restricted to avoid unauthorized access to configuration files, logs, and services

/vti_pvt/ /_vti_bin/ /_vti_log/ /_vti_cnf/ /_vti_bot/ /_vti_bin/_vti_adm/ /_vti_bin/_vti_aut/ /_vti_txt/

FrontPage Sensitive File Enumeration

Check for sensitive information leaks in FrontPage-related paths. This involves looking for potentially exposed configuration files, logs, or admin scripts that may reveal system details or credentials.

/_vti_inf.html /_vti_bin/shtml.dll/_vti_rpc /_vti_bin/owssvr.dll /_vti_bin/_vti_adm/admin.dll /_vti_bin/_vti_adm/admin.exe /_vti_bin/_vti_aut/author.exe /_vti_bin/_vti_aut/WS_FTP.log /_vti_bin/_vti_aut/ws_ftp.log /_vti_bin/shtml.exe/_vti_rpc /_vti_bin/_vti_aut/author.dll

Sensitive Files in /_vti_pvt/

Check the '/_vti_pvt/' directory for potentially exposed files that could contain sensitive data like passwords, configuration files, or other important information.

/ _vti_pvt/authors.pwd / _vti_pvt/administrators.pwd / _vti_pvt/users.pwd / _vti_pvt/service.pwd / _vti_pvt/service.grp / _vti_pvt/bots.cnf / _vti_pvt/service.cnf / _vti_pvt/access.cnf / _vti_pvt/writeto.cnf / _vti_pvt/botsinf.cnf / _vti_pvt/doctodep.btr / _vti_pvt/deptodoc.btr / _vti_pvt/linkinfo.cnf / _vti_pvt/services.org / _vti_pvt/structure.cnf / _vti_pvt/svcacl.cnf / _vti_pvt/uniqperm.cnf / _vti_pvt/service/lck / _vti_pvt/frontpg.lck

Sensitive Services in /_vti_bin/

Check for exposed services within the '/_vti_bin/' directory in FrontPage/SharePoint. Services exposed here can provide critical functionality that could be vulnerable to unauthorized access or exploitation.

/_vti_inf.html /_vti_bin/shtml.dll/_vti_rpc /_vti_bin/owssvr.dll /_vti_bin/_vti_adm/admin.dll /_vti_bin/_vti_adm/admin.exe /_vti_bin/_vti_aut/author.exe /_vti_bin/_vti_aut/WS_FTP.log /_vti_bin/_vti_aut/ws_ftp.log /_vti_bin/shtml.exe/_vti_rpc /_vti_bin/_vti_aut/author.dll /_vti_bin/spdisco.aspx /_vti_bin/Admin.asmx /_vti_bin/alerts.asmx /_vti_bin/dspsts.asmx /_vti_bin/forms.asmx /_vti_bin/Lists.asmx /_vti_bin/people.asmx /_vti_bin/Permissions.asmx /_vti_bin/search.asmx /_vti_bin/UserGroup.asmx /_vti_bin/versions.asmx /_vti_bin/Views.asmx /_vti_bin/webpartpages.asmx /_vti_bin/webs.asmx /_vti_bin/spsdisco.aspx /_vti_bin/AreaService.asmx /_vti_bin/BusinessDataCatalog.asmx /_vti_bin/ExcelService.asmx /_vti_bin/SharepointEmailWS.asmx /_vti_bin/spscrawl.asmx /_vti_bin/spsearch.asmx /_vti_bin/UserProfileService.asmx /_vti_bin/WebPartPages.asmx

Configuration Files in /_vti_bin/

Check for exposed SharePoint configuration files in the /_vti_bin/ directory. These files may contain important information about the SharePoint setup and could be a security risk if accessible.

/_vti_bin/microsoft.sharepoint.portal.xml /_vti_bin/microsoft.sharepoint.xml

Sensitive Files in /Forms/ Directory

Check for exposed forms in the /Forms/ directory that can allow access to sensitive data, like list items or form submissions.

/Forms/DispForm.aspx /Forms/DispForm.aspx?ID=1 /Forms/EditForm.aspx /Forms/EditForm.aspx?ID=1 /Forms/Forms/AllItems.aspx /Forms/MyItems.aspx /Forms/NewForm.aspx /Pages/default.aspx /Pages/Forms/AllItems.aspx

Sensitive Files in /_layouts/ Directory

Check for exposed scripts and pages in the /_layouts/ directory that might provide unauthorized access to system functions.

/layouts/SP.UI.ApplicationPages.ClientPicker.aspx /layouts/SP.UI.ApplicationPages.SelectWebPage.aspx /layouts/SP.UI.ApplicationPages.Login.aspx /layouts/SP.UI.ApplicationPages.EditForm.aspx /layouts/SP.UI.ApplicationPages.DialogPage.aspx /layouts/SP.SOD.js /layouts/SP.Core.js

Sparty2.0

Sparty 2.0 is a reconnaissance tool used to detect and fingerprint SharePoint instances, including version info, exposed endpoints, and common misconfigurations. It includes two main modules:

Reconnaissance module: Performs enumeration and information gathering on the target SharePoint instance.

python Sparty-2.0 -u https://example.com -enum

Exploitation module: Attempts to detect and exploit known vulnerabilities in the SharePoint environment.

python Sparty-2.0 -u https://example.com -exploit

Drupal

Last updated