Gobuster: Directory Brute-Forcing with Kali Linux

Configurare noua (How To)

Situatie

Solutie

Step 1: Install Gobuster
If you don’t have Gobuster installed on Kali Linux, you can install it with:
sudo apt update
sudo apt install gobuster

Step 2: Decide on a website you want to scan. For example, http://example.com.

Step 3: Find a Wordlist
Use an existing wordlist from /usr/share/wordlists/dirb/ or download one from SecLists. For this tutorial, we’ll use common.txt.

Step 4: Run Gobuster
Now, run Gobuster to scan for hidden directories and files:

gobuster dir -u http://example.com -w /usr/share/wordlists/dirb/common.txt -t 10

dir: Tells Gobuster to do a directory scan.
-u: The target URL.
-w: The wordlist you’ll use.
-t: The number of concurrent threads for faster results (default is 10, you can set up to 50).

Step 5: Review Results
Gobuster will show directories and files it found. Check for interesting paths (e.g., /admin, /uploads, etc.) that might be vulnerable.

This tutorial provides a quick, practical approach to using Gobuster for directory brute-forcing. You can expand by changing wordlists, using custom extensions, or tuning other options, but this will get you started with the basics.

Tip solutie

Permanent

Voteaza

(4 din 10 persoane apreciaza acest articol)

Despre Autor

Leave A Comment?