Skip to main content
Dudji's Docs home page
Overview
Playbook
Attacks
Tech
Payloads
Tools
Home
Home
Search...
Search...
Navigation
Enumeration
Enumeration
Overview
Playbook
Recon
Enumeration
Web Enumeration
Exploitation
Post-Exploitation
Enumeration
Enumeration
Systematic enumeration to identify vulnerabilities, misconfigurations, and attack paths.
Enumeration goes deeper than recon — it involves
actively querying
services, applications, and systems to extract actionable intelligence.
Web Enumeration
Directory busting, parameter fuzzing, technology fingerprinting, and more.
Recon
Web Enumeration
⌘I
Assistant
Responses are generated using AI and may contain mistakes.