🎯 WEEKLY BRIEF

Today we are going over Gobuster. Gobuster is a high performance CLI (command line interface) tool used to discover hidden content on web servers. It is like uncovering a secret passageway or a hidden room.

Most websites dont link to every file they own. Hidden admin panels, backup files (config.zip), and development subdomains (dev.site.com) are goldmines for security researchers. Gobuster automates the process of finding them by guessing names from a massive list at incredible speeds.

🛠️ TOOL OF THE WEEK : GOBUSTER

🫠 Intro to Gobuster

Finding hidden doors of a website SHOULD NOT feel like a guessing game. If you are tired of clicking around or using sluggish tools, its time to master Gobuster!

🚀 Getting Started

If your on Kali Linux you should already have it installed. If not, installation is pretty simple:


Debian-based Linux: sudo apt install gobuster

Fedora-based Linux: sudo dnf install gobuster

Pro Tip: A tool is only as good as its vocabulary. Use SecLists for your wordlists. Install it with sudo apt install seclists.

📂 Mode 1: Directory Busting (dir)

This is the most common use case. You can find hidden folders and files.

The command: gobuster dir -u <TARGET IP OR SITE> -w /usr/share/wordlists/dirb/common.txt

Essential Flags:

  • -x .php,.html,.txt: Search for specific file extensions.

  • -t 50: Set the thread count (50 is usually the sweet spot for speed).

  • -k: Skip SSL certificate verification (essential for self-signed lab targets).

Flag

Description

Example

-u, --url

The target URL you want to scan.

-u https://site.com

-x, --extensions

Search for specific file extensions.

-x php,txt,zip

-k, --no-tls-validation

Skip SSL certificate verification.

-k

-b, --status-codes-blacklist

Hide specific HTTP codes.

-b 404,403

-s, --status-codes

Only show specific HTTP codes.

-s 200,301

-a, --useragent

Specify a custom User-Agent string.

-a "Mozilla/5.0"

-r, --follow-redirect

Follow HTTP redirects (301/302).

-r

🌐 Mode 2: Subdomain Hunting (dns)

You found a main site but want to find the staging or API area? Use DNS mode!

The command: gobuster dns -d <TARGET IP OR SITE> -w /path/to/subdomains.txt

The "Wildcard" Gotcha: If a domain uses wildcard DNS, Gobuster might report that everything exists. Use the --wildcard flag to filter out the noise.

Flag

Description

Example

-d, --domain

The target domain name.

-d example.com

-i, --show-ips

Show the IP addresses associated with subdomains.

-i

-c, --show-cname

Show CNAME records (useful for cloud hunting).

-c

--wildcard

Force operation even if wildcard DNS is found.

--wildcard

-r, --resolver

Use a custom DNS server (e.g., Google or Cloudflare).

-r 8.8.8.8

‼️3 Pro Tips for Your Next Scan

  • Output to a File: Use -o results.txt to save your findings.

  • Filter by Status Code: Use -b 403,404 to hide the "Forbidden" or "Not Found" results.

  • Be Kind: Use --delay 500ms if you are scanning a live production site to avoid being a "denial of service" by accident.

🏳️Global flags you should note

These flags can be used regardless of whether you are in dir or dns mode.

Flag

Description

Example

-t, --threads

Number of concurrent threads (default: 10).

-t 50

-v, --verbose

Enable verbose output (shows everything).

-v

-z, --no-progress

Don't display the progress bar (better for logs).

-z

-q, --quiet

Only print the results, hide the banner/noise.

-q

-o, --output

Save results to a specific file.

-o results.txt

-w, --wordlist

Path to the wordlist you want to use.

-w /path/to/list.txt

--delay

Time to wait between requests (stealth mode).

--delay 100ms

Keep Reading