Skip to main content

Web Application Attack Surface Mapping

Systematically map a web application's content, entry points, technologies, and attack surface during authorized security testing or security-focused code review. Use this skill whenever you are performing reconnaissance on a web application, need to enumerate application functionality and hidden content, want to identify all user-input entry points (URLs, query parameters, POST fields, cookies, HTTP headers), need to fingerprint server-side technologies from HTTP responses, or are building an attack surface inventory before vulnerability testing. Also invoke it when analyzing application behavior to infer server-side structure, looking for undiscovered directories and files through brute-force enumeration, using search engines or web archives to find historical content, probing for hidden debug parameters, mapping functional paths in parameter-driven applications, or producing a behavior-to-vulnerability mapping that prioritizes which areas to probe first. Produces a structured attack surface map: enumerated URLs and functional paths, identified entry points, technology fingerprint, and a prioritized vulnerability-class checklist. Does not perform active exploitation — use this before any active testing phase.

Install

1. Add marketplace
/plugin marketplace add bookforge-ai/bookforge-skills
2. Install plugin
/plugin install web-application-hackers-handbook@bookforge-skills
3. Use the skill
/web-application-attack-surface-mapping
CC-BY-SA · Open sourceGitHub

What You'll Need

ReadGrepWriteBash (optional)WebFetch (optional)

Skill Relationships

Requires

No prerequisites. This is a foundation skill.

Source Book

The Web Application Hacker's Handbook cover

The Web Application Hacker's Handbook

Dafydd Stuttard and Marcus Pinto