Fingerprinting Web Servers with Nmap
sudo nmap -p80 -sV 192.168.50.20
sudo nmap -p80 --script=http-enum 192.168.50.20
Technology Stack Identification with Wappalyzer

Directory Brute Force
gobuster dir -u 192.168.50.20 -w /usr/share/wordlists/dirb/common.txt -t 5
Debugging Page Content


Enumerating and Abusing APIs
Podemos fuzzear por apis con un fichero pattern que sobre las rutas encontradas con gobuster, pruebe /v1 y /v2.
gobuster dir -u <http://192.168.50.16:5002> -w /usr/share/wordlists/dirb/big.txt -p pattern

Enumeración de api con el parametro -i de curl para listar la api.
kali@kali:~$ curl -i <http://192.168.50.16:5002/users/v1>
HTTP/1.0 200 OK
Content-Type: application/json
Content-Length: 241
Server: Werkzeug/1.0.1 Python/3.7.13
Date: Wed, 06 Apr 2022 09:27:50 GMT
{
"users": [
{
"email": "[email protected]",
"username": "name1"
}