tools

Gobuster

A tool for brute forcing webpages (aka directory busting), DNS names, and virtual hosts - written in Go.

The repository can be found at https://github.com/OJ/gobuster

Installation

Kali Linux

gobuster does not come preinstalled on Kali Linux, but it does have a package. Install with:

$ sudo apt-get install gobuster

Other Operating Systems

If your package manager doesn’t have gobuster, or you want to install from source on Kali instead of using apt, you can follow the installation instructions in the repo.

Dir Busting

Basic Syntax

$ gobuster dir -u [URL] -w /path/to/wordlist

Which Wordlist to Use?

I like to use the SecLists Discovery lists. The most common one I use is located at /path/to/seclists/Discovery/Web-Content/raft-small-words.txt. SecLists comes preinstalled on Kali Linux, and is found at /usr/share/seclists.

You may also wish to use a larger list, such as raft-large-words.txt, or a list for a specific platform, such as tomcat.txt against a known Tomcat server.

If you do not wish to install SecLists some distributions come with alternative wordlists, for example /usr/share/wordlists/dirb/common.txt. However, many of the dirb wordlists miss important items, such as checking for a .git file.

Add Extensions

If you know your target site is using a specific file extension, such as php or jsp, you can specify this with the -x flag

$ gobuster dir -u example.com -w /path/to/wordlist -x php,asp

VHOST Busting

You can also use Gobuster to brute force Virtual Hosts (aka subdomains). Use vhost mode to do this.

Basic Syntax

gobuster vhost -u example.com -w /path/to/wordlist

This will append subdomains to the beginning of the hostname, e.g. staging.example.com. A good wordlist can be found at /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt.

Practical example: IppSec does this on Academy

Tags

#cheat-sheet #enum