GoBuster
:LiOctagonAlert:
Available Commands:
dir==> Find hidden directories and files on a website.
gobuster dir -u http://example.com -w /usr/share/wordlists/dirb/common.txt
-
dns==> Find valid subdomains using DNS resolution.
gobuster dns -d example.com -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt- OPTIONAL: To specify DNS server:
--dns-server 1.1.1.1
- OPTIONAL: To specify DNS server:
vhost==> Find virtual hosts configured on the server (host header bruteforce).
gobuster vhost -u http://10.10.10.10 -w /usr/share/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt
fuzz==> Insert your payload anywhere in the URL (like params, headers, etc.)
gobuster fuzz -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt
OR
gobuster fuzz -u "http://example.com/page.php?id=FUZZ" -w payloads.txt
s3==> Uses aws bucket enumeration mode
We can also add:
-x php,html,txt,zip
To guess file extensions.
GoBuster <mode> -u <url> -w <path_to_wordlist.txt>
E.g: gobuster dir -u http://google.com -w /usr/share/wordlists/rockyou.txt