<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Web Enumeration on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/categories/web-enumeration/</link><description>Recent content in Web Enumeration on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/categories/web-enumeration/index.xml" rel="self" type="application/rss+xml"/><item><title>Web Enumeration</title><link>https://leikah.haoyingcao.xyz/en/docs/enumeration/web_enum/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/enumeration/web_enum/</guid><description>&lt;p&gt;The primary goals of web recon are to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Identify assets&lt;/strong&gt; (web pages, subdomains, IP address, tech stacks, etc.)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Discover hidden information&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Analyze the attack surface&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Gather information&lt;/strong&gt; that can be leveraged for further exploitation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Similar to recon targeted toward other environments and services, web recon can be categorized into &lt;strong&gt;passive&lt;/strong&gt; and &lt;strong&gt;active&lt;/strong&gt; recon.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Passive Recon&lt;/strong&gt; avoids interacting with the target(s) directly.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Active Recon&lt;/strong&gt; interacts with the target(s) directly.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This article will mainly go over Active Recon techniques.&lt;/p&gt;</description></item></channel></rss>