Skip to content

Gobuster ​

TIP

Gobuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains.

πŸ”— Official Resources ​

πŸš€ Common Commands ​

TaskCommand
Directory brute-forcinggobuster dir -u https://target.com -w wordlist.txt
DNS subdomain brute-forcinggobuster dns -d target.com -w wordlist.txt
VHost brute-forcinggobuster vhost -u https://target.com -w wordlist.txt

🏷️ Useful Flags ​

FlagDescription
-uTarget URL/domain
-wWordlist file
-tNumber of concurrent threads
-xFile extension(s) to search for (e.g., -x php,txt)
-oOutput file
-sStatus codes to include (e.g., -s 200,204,301,302,307,403,500)
-rFollow redirects

WARNING

Always have permission before brute-forcing with Gobuster. Unauthorized testing is illegal and unethical.

πŸ“š Resources ​

πŸ† HTB CTF Go-To Command ​

A common Gobuster command for directory brute-forcing in HTB CTFs:

bash
gobuster dir -u http://10.10.10.10/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 40 -x php,txt,html -o gobuster_results.txt
  • -u : Target URL (replace with the actual target IP)
  • -w : Wordlist path
  • -t 40 : Use 40 threads for speed
  • -x : File extensions to check
  • -o : Output results to a file