************************## Gobuster Overview
Gobuster is a robust and versatile tool designed for brute-forcing URIs (directories and files), DNS subdomains, and virtual host names. It is widely used by security professionals for web application testing and reconnaissance. For this guide, the focus will be on using Gobuster to brute-force directories.
Key Features
- Brute-force directories and files.
- Enumerate DNS subdomains.
- Fuzzing capabilities.
- AWS S3 bucket enumeration.
- Virtual host enumeration.
Modules
Gobuster includes several modules, each targeting different types of enumeration:
dir # Uses directory/file enumeration mode
dns # Uses DNS subdomain enumeration mode
fuzz # Uses fuzzing mode
help # Help about any command
s3 # Uses AWS bucket enumeration mode
version # Shows the current version
vhost # Uses virtual host enumeration mode
Flags
Gobuster offers a variety of global flags for customization and output control:
--delay <duration> # Time each thread waits between requests (e.g., 1500ms)
-h, --help # Help for gobuster
--no-error # Don't display errors
-z, --no-progress # Don't display progress
-o, --output <string> # Output file to write results
-p, --pattern <string> # File containing replacement patterns
-q, --quiet # Don't print the banner and other noise
-t, --threads <int> # Number of concurrent threads (default 10)
-v, --verbose # Verbose output (errors)
-w, --wordlist <string> # Path to the wordlist
Examples
Directory Enumeration with Wordlist Selection
gobuster dir -w `fzf-wordlists` -u http://0.0.0.0
- Prompts for wordlist selection using
fzf-wordlists
.
Directory Enumeration with Specified File Extensions
gobuster dir -u http://0.0.0.0 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x txt,html,js,json,php,py
-x txt,html,js,json,php,py
: Specifies the file extensions to search for.
Directory Enumeration Ignoring Specific Status Codes
gobuster dir -u http://0.0.0.0 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -d 403 404
-d 403 404
: Ignores HTTP status codes 403 and 404.
DNS Subdomain Enumeration
gobuster dns -d http://0.0.0.0 -w /usr/share/SecLists/Discovery/DNS/namelist.txt
- Uses the DNS module with a specified wordlist for subdomain enumeration.
Directory Enumeration with Proxy
gobuster dir -u http://0.0.0.0 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x txt,html,js,json,php,py --proxy http://127.0.0.1:8081
- Uses a proxy for the requests.