We already crawled a full application's directory and have the list of all referenced files and directories inside it. The natural next step is to identify which of those contains relevant information or represents an opportunity to have a greater chance of finding vulnerabilities.
More than a recipe, this will be a catalog of common names, suffixes, or prefixes used for files and directories that usually lead to information useful to the penetration tester or to the exploitation of vulnerabilities that may end in complete system compromise.