Ignacio J. Perez Portal

Results 188 comments of Ignacio J. Perez Portal

@Silly26 I've provided a solution in my previous comment. Please try running `git clone -b i770 https://github.com/ItsIgnacioPortal/SecLists/`

What would be the purpose of this wordlist? Why would you want to fuzz that IIS folder? I can only imagine it being useful for spidering

> There can be CGIs Do you mean "CGI" as in Common Gateway Interface?

What could this wordlist be used for? If its for detecting a SharePoint instance, it’s too long Also how did you make this wordlist?

> It's for enumerating what files/functionality are being used to discover the attack surface of a SharePoint instance. Interesting.. Could you give me an example? I'm not very familiar with...

I see. Alright, now all that's left to do is fix those duplicate slashes. Also, please rename the wordlist to `sharepoint-ennumeration.txt`. Always use long, descriptive names, if possible.

How did you get these parameters? are they URL parameters?

Great! Could you also add https://gist.github.com/nullenc0de/e9d1f2a8a0a38c9bfcb5bdb9fc7191ea, since they were both announced in the same tweet. Just make sure to remove the trailing `/` some entries have Also, could you rename...

I have no idea of where @danielmiessler got that list from. The files were uploaded on commit [f50231d90afeff9738d34d3041381ec44b6b202e](https://github.com/danielmiessler/SecLists/commit/f50231d90afeff9738d34d3041381ec44b6b202e#comments), but that commit does not have information about the source. I fear...

> I find it can make scripting a little more inconvenient when reading these files as there is one more item to think about. How so? Any half decent library/tool...