CTF Support
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

General

Introduction

Before exploiting web vulnerabilities, information gathering is key. Using proxies, directory enumeration, and version control leaks, you can identify potential entry points or secrets in a challenge’s web application.

Quick Reference

Task Tool / Command
Intercept & modify requests Burp Suite, OWASP ZAP, Caido
Check sensitive files /robots.txt, /.git/, /.DS_Store
Dump leaked Git repos git-dumper, GitTools

Tools

Tool Purpose
Burp Suite Comprehensive web proxy and exploitation suite
OWASP ZAP Open‑source proxy for scanning and fuzzing
Caido Modern proxy alternative with clean UI
GitTools Download and recover .git repository leaks
git-dumper Clone .git directories exposed via web

Tips

  • Always begin by mapping the site using a proxy.
  • Test direct file access (robots.txt, .env, .git/HEAD, .htaccess).
  • Reconstruct repositories found online via .git.
  • Check for API endpoints or commented URLs in HTML or JS source.