{"id":18233,"date":"2022-01-04T13:22:47","date_gmt":"2022-01-04T07:52:47","guid":{"rendered":"https:\/\/www.varutra.com\/?p=18233"},"modified":"2022-12-02T11:13:22","modified_gmt":"2022-12-02T05:43:22","slug":"using-seclists-for-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/","title":{"rendered":"Using SecLists for Penetration Testing"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2022\/01\/Using-SecLists-for-Penetration-Testing-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Using SecLists for Penetration Testing - Varutra Consulting\"><\/p>\n<h3><strong>Introduction to <\/strong><strong>SecLists<\/strong><\/h3>\n<p>Seclists is something that comes very handy to a pen tester. The simple reason is, it has a collection of all the wordlist lists that is related to different technologies, web servers, and web shells that can be helpful while performing penetration testing on any particular target.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How to Install SecLists?<\/strong><\/h3>\n<p>All the Kali machine has the option of seclists. To run it for pentesting, we need to install it in our system. There are a couple of different ways of installing it on our machine.<\/p>\n<ul>\n<li>We can install it by cloning the seclists repository from GitHub and importing the same into the system. Then, we just have to run the install command.<\/li>\n<li>Another way is to connect to the seclists repository online and then, run the install command in the system to install it.<\/li>\n<\/ul>\n<p>Here is also an alternate method of installing the lists in the system. There will not be any problem in installing seclists directly by connecting to the package online if your system is up-to-date. In case, your system is not up-to-date then you may come across some issues while installing. In such a scenario, you can opt for updating the index package in the sources.list file. Edit the file and add the following path for the kali index in the file.<\/p>\n<p>Path to add in the file:<\/p>\n<p><a href=\"https:\/\/mirrors.ocf.berkeley.edu\/kali-images\/current\/\">https:\/\/mirrors.ocf.berkeley.edu\/kali-images\/current\/<\/a><\/p>\n<p>After adding this index path to the file, save the file and then run the following command in the terminal to install the seclists in your system.<\/p>\n<p>Command:<\/p>\n<p>sudo apt-get install seclists<\/p>\n<p>After installing, you can access the seclists under the path: <u>\/usr\/share\/seclists<\/u>. There are different types of lists that are included in this folder.<\/p>\n<ul>\n<li>Discovery<\/li>\n<li>Fuzzing<\/li>\n<li>IOC\u2019s<\/li>\n<li>Miscellaneous<\/li>\n<li>Passwords<\/li>\n<li>Pattern-Matching<\/li>\n<li>Payloads<\/li>\n<li>Usernames<\/li>\n<li>Web-Shells<\/li>\n<\/ul>\n<p>Below is the tree representation of seclists. The tree displays its directory structure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18238 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/01\/Tree-structure-of-Seclists.png\" alt=\"Tree structure of Seclists\" width=\"580\" height=\"453\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Tree-structure-of-Seclists.png 580w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Tree-structure-of-Seclists-300x234.png 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Tree structure of Seclists<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18237 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/01\/Tree-structure-of-seclists-2.png\" alt=\"Tree structure of seclists for penetration testing\" width=\"583\" height=\"358\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Tree-structure-of-seclists-2.png 583w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Tree-structure-of-seclists-2-300x184.png 300w\" sizes=\"(max-width: 583px) 100vw, 583px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Tree structure of seclists<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How to use SecLists?<\/strong><\/h3>\n<p>Seclists contains a lot of different wordlists that are used for multiple purposes with different available tools. These lists are segregated according to usage. In this blog, we will discuss a couple of the seclists categories and how to use them.<\/p>\n<ul>\n<li><strong>Discovery:<\/strong>\u00a0It is the initial phase in pentesting. Once the target is fixed, an attacker will try to gather information about the target and move forward accordingly.<\/li>\n<\/ul>\n<p>This phase includes enumerating the target for different things like subdomains, open ports, running services, etc. The discovery module includes different sub-categories like DNS, Infrastructure, SNMP, Web-Content, and more that can be used for enumerating the target.<\/p>\n<p>Eg: The below example shows how we can automate the process of sub-domain enumeration using dirb and seclists.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18236 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/01\/Subdomain-enumeration-using-dirb.png\" alt=\"Subdomain enumeration using dirb\" width=\"608\" height=\"355\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Subdomain-enumeration-using-dirb.png 608w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Subdomain-enumeration-using-dirb-300x175.png 300w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Subdomain enumeration using dirb<\/p>\n<p>&nbsp;<\/p>\n<p>In the above-shown example the command that was used is as follows:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>dirb <a href=\"http:\/\/demo.testfire.net\">http:\/\/demo.testfire.net<\/a> \/usr\/share\/seclists\/Discovery\/DNS\/subdomains-top1million-5000.txt.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Here in this command, the first part is the URL of the target i.e.,\u00a0<a href=\"http:\/\/demo.testfire.net\">http:\/\/demo.testfire.net<\/a>\u00a0and we have given the path of the wordlist that is used from the discovery module of seclists.<\/p>\n<p>And below you can see different subdomains found for the given target.<\/p>\n<ul>\n<li><strong>Fuzzing:<\/strong>\u00a0Fuzzing is a technique where an attacker might try to feed large volumes of inaccurate data like payloads into an input field until a bug or a vulnerability is found. The fuzzing module of seclists contains the following wordlist related to different types of attacks.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18235 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/01\/Wordlists-in-fuzzing-module-of-Seclists.png\" alt=\"Wordlists in fuzzing module of Seclists\" width=\"608\" height=\"246\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Wordlists-in-fuzzing-module-of-Seclists.png 608w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Wordlists-in-fuzzing-module-of-Seclists-300x121.png 300w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Wordlists in fuzzing module of Seclists<\/p>\n<p>There are different lists related to Databases, LFI, SQLi, XSS, etc. using which you can fuzz for the respective attacks.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>This way you can successfully learn how to install and run seclists in your system and use them for pentesting. There are various penetration methods like <a href=\"https:\/\/www.varutra.com\/android-penetration-testing-with-drozer\/\">android penetration testing with drozer<\/a>, <a href=\"https:\/\/www.varutra.com\/aws-pentesting-part-1\/\">AWS pentesting<\/a>, and much more that you can read in our <a href=\"https:\/\/www.varutra.com\/blogs\/\">blog<\/a> section.<\/p>\n<p>&nbsp;<\/p>\n<p>Author<\/p>\n<p><strong>Pralekya H.<\/strong><\/p>\n<p>Associate Security Consultant<\/p>\n<p>Attack &amp; Pentest Team,<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction to SecLists Seclists is something that comes very handy to a pen tester. The simple reason is, it has a collection of all the&#8230;<\/p>\n","protected":false},"author":4,"featured_media":18244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[51,272],"tags":[139,594,593,592],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Using SecLists for Penetration Testing | Varutra Consulting\" \/>\n\t\t<meta property=\"og:description\" content=\"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"attack and pentest\" \/>\n\t\t<meta property=\"article:tag\" content=\"pen tester\" \/>\n\t\t<meta property=\"article:tag\" content=\"pentest\" \/>\n\t\t<meta property=\"article:tag\" content=\"seclists\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-01-04T07:52:47+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T05:43:22+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Using SecLists for Penetration Testing | Varutra Consulting\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#article\",\"name\":\"Using SecLists for Penetration Testing | Varutra Consulting\",\"headline\":\"Using SecLists for Penetration Testing\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Using-SecLists-for-Penetration-Testing.png\",\"width\":1200,\"height\":627,\"caption\":\"Using SecLists for Penetration Testing\"},\"datePublished\":\"2022-01-04T13:22:47+05:30\",\"dateModified\":\"2022-12-02T11:13:22+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#webpage\"},\"articleSection\":\"Android Security, Web Application Security, attack and pentest, pen tester, pentest, seclists\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#listItem\",\"position\":2,\"name\":\"Using SecLists for Penetration Testing\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/\",\"name\":\"Using SecLists for Penetration Testing | Varutra Consulting\",\"description\":\"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Using-SecLists-for-Penetration-Testing.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Using SecLists for Penetration Testing\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/using-seclists-for-penetration-testing\\\/#mainImage\"},\"datePublished\":\"2022-01-04T13:22:47+05:30\",\"dateModified\":\"2022-12-02T11:13:22+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Using SecLists for Penetration Testing | Varutra Consulting<\/title>\n\n","aioseo_head_json":{"title":"Using SecLists for Penetration Testing | Varutra Consulting","description":"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Using SecLists for Penetration Testing | Varutra Consulting","og:description":"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/","article:tag":["attack and pentest","pen tester","pentest","seclists"],"article:published_time":"2022-01-04T07:52:47+00:00","article:modified_time":"2022-12-02T05:43:22+00:00","twitter:card":"summary_large_image","twitter:title":"Using SecLists for Penetration Testing | Varutra Consulting","twitter:description":"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#article","name":"Using SecLists for Penetration Testing | Varutra Consulting","headline":"Using SecLists for Penetration Testing","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Using-SecLists-for-Penetration-Testing.png","width":1200,"height":627,"caption":"Using SecLists for Penetration Testing"},"datePublished":"2022-01-04T13:22:47+05:30","dateModified":"2022-12-02T11:13:22+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#webpage"},"articleSection":"Android Security, Web Application Security, attack and pentest, pen tester, pentest, seclists"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#listItem","position":2,"name":"Using SecLists for Penetration Testing","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/","name":"Using SecLists for Penetration Testing | Varutra Consulting","description":"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/01\/Using-SecLists-for-Penetration-Testing.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#mainImage","width":1200,"height":627,"caption":"Using SecLists for Penetration Testing"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/#mainImage"},"datePublished":"2022-01-04T13:22:47+05:30","dateModified":"2022-12-02T11:13:22+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"18233","title":"Using SecLists for Penetration Testing | Varutra Consulting","description":"Seclists is something that comes very handy to a pen tester. It is a collection of all the wordlist list used for penetration testing on any particular target.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"SecLists\",\"score\":100,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"penetration testing\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"pen tester\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2022-01-04 06:35:49","updated":"2022-12-02 05:56:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/android-security\/\" title=\"Android Security\">Android Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tUsing SecLists for Penetration Testing\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Android Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/android-security\/"},{"label":"Using SecLists for Penetration Testing","link":"https:\/\/www.varutra.com\/varutravrt3\/using-seclists-for-penetration-testing\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18233"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=18233"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18233\/revisions"}],"predecessor-version":[{"id":20197,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18233\/revisions\/20197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/18244"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=18233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=18233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=18233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}