10Nis
CTF or Bug Bounty info gathering workflows [closed]
What is the best way to get more information from the information-gathering stages/ reconnaissance when trying CTFs? Is there any workflow for a new cybersecurity student who knows some programming?
for example consider against virtual machines from vulnhub Tool based workflows
Current workflow
Use Kali then tools in the following order
- netdiscover for finding IP
- nmap /nmap vulners for open ports / may be some CVEs
- dirb /sublist3r enumerating the directories
I wanted to add ffuz but I don't know if it will slow down or speed up the process.
I read that Nmap can do everything if we get the IP but if we do not have a specified IP, how should I go about any suggestions?