Tutorial Finding a bug host or identifying vulnerabilities on a website like www.globe.com.ph

Extra Focus

Forum Veteran
Finding a bug host or identifying vulnerabilities on a website like You do not have permission to view the full content of this post. Log in or register now. involves ethical häçking practices and should only be done with proper authorization. Unauthorized attempts to find vulnerabilities can be îllégâl and unethical. However, if you are authorized to perform security testing on a website, here are some general steps and tools you can use:

Prerequisites

1. Authorization: Ensure you have explicit permission from the website owner to perform security testing.
2. Knowledge: Familiarize yourself with ethical häçking principles and methodologies.
3. Tools: Install necessary tools for vulnerability scanning and penetration testing.

Steps to Find Vulnerabilities

1. Reconnaissance


Gather information about the target website.

  • WHOIS Lookup: Use tools like You do not have permission to view the full content of this post. Log in or register now. to gather domain information.
  • DNS Enumeration: Use tools like nslookup, dig, or You do not have permission to view the full content of this post. Log in or register now. to gather DNS information.
  • Subdomain Enumeration: Use tools like Sublist3r or You do not have permission to view the full content of this post. Log in or register now. to find subdomains.

2. Scanning

Identify open ports and services running on the target.

- Nmap: Use Nmap to scan for open ports and services.
Code:
bash
  nmap -sS -sV www.globe.com.ph

3. Vulnerability Scanning

Use automated tools to scan for known vulnerabilities.

You do not have permission to view the full content of this post. Log in or register now.
4. Manual Testing

Perform manual testing to identify vulnerabilities that automated tools might miss.

  • SQL Injection: Test for SQL injection vulnerabilities using tools like sqlmap or manual techniques.
  • Cross-Site Scripting (XSS): Test for XSS vulnerabilities by injecting scripts into input fields.
  • Cross-Site Request Forgery (CSRF): Test for CSRF vulnerabilities by crafting malicious requests.

5. Reporting

Document your findings and report them to the website owner.

  • Detailed Report: Include detailed information about each vulnerability, including steps to reproduce, potential impact, and recommended fixes.
  • Responsible Disclosure: Follow responsible disclosure practices to ensure the vulnerabilities are fixed before they are publicly disclosed.

Tools

You do not have permission to view the full content of this post. Log in or register now.
Disclaimer

Performing security testing without proper authorization is îllégâl and unethical. Always ensure you have explicit permission from the website owner before conducting any security tests.
 
Did you know?

Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet. A web host, or web hosting service provider, is a business that provides the technologies and services needed for a website or webpage to be viewed on the Internet. Websites are hosted, or stored, on special computers called servers.

When Internet users want to view your website, all they need to do is type your website address or domain into their browser. Their computer will then connect to your server, and your webpages will be delivered to them through the browser.

When it comes to web hosting companies based on the number of hosted websites, GoDaddy has established itself as a clear market dominator. According to HostAdvice, GoDaddy has covered over 19% of the market, leaving a not-so-significant market share to other hosting providers such as Google Cloud Platform, 1&1, Amazon Web Services, and Cloudflare.

According to Builtwith, GoDaddy has also managed to become a world dominator when it comes to providing VPS web hosting. GoDaddy’s market share in this segment counts for over 23%, whereas its closest competitors, such as DreamHost and Digital Ocean, cover 1.46% and 1.23% of the market share, respectively.

Users search this thread by keywords

  1. Bug host
  2. nmap
  3. burp suite
  4. Sql injection
  5. find host
  6. finding open port
  7. burp
  8. domain lookup
  9. bugs host
  10. Website
  11. häçking tools
  12. dns lookup
  13. Sqlmap
  14. DNS
  15. häçking tools scanner
  16. GLOBIBO
  17. sql inject
  18. nslookup
  19. domains to scan for bug host
  20. Website häçking / Penetration Testing
  21. Web häçk tools
  22. Find bug host
  23. website häçking
  24. Website häçk
  25. Bug Scanner
  26. Scan host
  27. bug
  28. bug/host

About this Thread

  • 9
    Replies
  • 1K
    Views
  • 10
    Participants
Last reply from:
dadiming

Trending Content

Online now

Members online
700
Guests online
8,672
Total visitors
9,372

Forum statistics

Threads
2,033,036
Posts
27,572,935
Members
1,600,936
Latest member
Xrazy
Back
Top