When initially moving through the site, do it through Burpsuite as it will allow one to see all past requests and how they are handled.
In-Depth enumeration
Nikto
Scan sites for known vulnerabilities, misconfigurations and directories.
nikto-h<host>
FFUF
# Directory scanffuf-u<host>/FUZZ-w<wordlist>ffuf-u<host>/FUZZ-w<wordlist>-e.txt,.php,.html# DNS / Sub-domain scanffuf-u<ip>-H"Host: FUZZ.host.local"-w<wordlist>-mcall
gobuster
# Directory scangobusterdir-u<IP>-w<wordlist>gobusterdir-u<IP>-w<wordlist>-xtxt,php,html# DNS / Sub-domain scangobusterdns-d<host>-w<wordlist># VHOST scanninggobustervhost-u<host>-w<wordlist>
feroxbuster
# Scan for DIRsferoxbuster-u<host>feroxbuster-u<host>-xhtml,php
Wfuzz
Wfuzz is a tool designed for brute-forcing Web Applications, it can be used for finding resources not linked directories, servlets, scripts, etc.
# DNS scanwfuzz-u<ip>-H"Host: FUZZ.domain.local"-w<wordlist># Bruteforce internal port (SSRF)wfuzz-c-zrange,1-65535--hl=2http://<ip>:<port>/url.php?path=http://localhost:FUZZ# URL parameter discoverywfuzz-uhttps://<link>/<page>/?FUZZ=-w<wordlist>-H"Cookie: PHPSESSID="
Zap
Zap is a web scanner that simulates human movemennt and tries to discover the target. It can also detect basic vulnerabilities as well as weak coding practices.
WordPress
WPScan
WordPress security scanner
wpscan--url<url>-eap,at,dbe,u
Ports
80 HTTP
443 HTTPS
8000 HTTP Alternative
8080 HTTP Alternative