• caglararli@hotmail.com
  • 05386281520

CTF or Bug Bounty info gathering workflows [closed]

Çağlar Arlı      -    6 Views

CTF or Bug Bounty info gathering workflows [closed]

What is the best way to get more information from the information-gathering stages/ reconnaissance when trying CTFs? Is there any workflow for a new cybersecurity student who knows some programming?

for example consider against virtual machines from vulnhub Tool based workflows

Current workflow

Use Kali then tools in the following order

  1. netdiscover for finding IP
  2. nmap /nmap vulners for open ports / may be some CVEs
  3. dirb /sublist3r enumerating the directories

I wanted to add ffuz but I don't know if it will slow down or speed up the process.

I read that Nmap can do everything if we get the IP but if we do not have a specified IP, how should I go about any suggestions?