# Pentesting Port 80,443

## Nmap Scan Command

```python
# -A means Aggressive Scan
# -v means Verbose Output

 # i normally use this command for initial scan this works best for me 
 
nmap -A -v 10.10.10.10  
```

## Nmap Full  Port Scan Command (If you want to Speed Up )

```python
# --min-rate will make the scan faster, you can send any number of packets you want 

# I run this command more than 2 times to confirm, because it is very fast

nmap -A -v -p- --min-rate=10000 10.10.10.10

```

## Directory BruteForcing

For Directory Bruteforcing my favourite Tool is **FFUF** and **Feroxbuster**

### Feroxbuster Command

```python
# this is the command which i use when i use feroxbuster
# I Normally Change this command based on the output
# i have edited the configuration file to use common.txt wordlist from seclist
 
feroxbuster -u https://www.google.com/
```

<figure><img src="https://3420091786-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fy1ZUO45eHY8aMCLJ7OiN%2Fuploads%2FdGRV972uNCTp4dB2ykao%2Ffero-image.png?alt=media&#x26;token=9eb82047-b947-45f9-a904-d07a41dc1fad" alt=""><figcaption></figcaption></figure>

### Feroxbuster POST and GET Fuzzing

```python
feroxbuster -u http://www.google.com -m GET,POST
```

<figure><img src="https://3420091786-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fy1ZUO45eHY8aMCLJ7OiN%2Fuploads%2FiyGmY3Vt5ojwEvC2X98F%2Fimage.png?alt=media&#x26;token=ecaebcb3-6832-4be4-ac4d-bdf7c3098c7b" alt=""><figcaption></figcaption></figure>

### Changing the Conf of Feroxbuster

I use **Sublime text** for editing my stuff and for code editing i use **VScode**

```html
┌──(root㉿kali)-[~]
└─ subl /etc/feroxbuster/ferox-config.toml

```

<figure><img src="https://3420091786-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fy1ZUO45eHY8aMCLJ7OiN%2Fuploads%2FkdzDAKco6Sr6Wke5s16G%2Ffero-conf-img.png?alt=media&#x26;token=b942038d-cc32-4d81-af91-7c58c915b7dc" alt=""><figcaption><p>I have set the wordlist to Common.txt from seclist</p></figcaption></figure>

## FFUF Command

I use the following command when i use **FFUF**

```python
# -u is for url
# -w is for wordlist
# -c is for colors

# i use more flags as well for filtering, but this is my basic command

ffuf -u https://www.google.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/common.txt -c
```

<figure><img src="https://3420091786-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fy1ZUO45eHY8aMCLJ7OiN%2Fuploads%2FqQfdSEo2Tp3oaYXerQmK%2Fffuf-img.png?alt=media&#x26;token=6344d5a0-e6b1-469d-98b0-938ec2baf294" alt=""><figcaption></figcaption></figure>
