Gobuster β
TIP
Gobuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains.
π Official Resources β
π Common Commands β
| Task | Command |
|---|---|
| Directory brute-forcing | gobuster dir -u https://target.com -w wordlist.txt |
| DNS subdomain brute-forcing | gobuster dns -d target.com -w wordlist.txt |
| VHost brute-forcing | gobuster vhost -u https://target.com -w wordlist.txt |
π·οΈ Useful Flags β
| Flag | Description |
|---|---|
-u | Target URL/domain |
-w | Wordlist file |
-t | Number of concurrent threads |
-x | File extension(s) to search for (e.g., -x php,txt) |
-o | Output file |
-s | Status codes to include (e.g., -s 200,204,301,302,307,403,500) |
-r | Follow redirects |
WARNING
Always have permission before brute-forcing with Gobuster. Unauthorized testing is illegal and unethical.
π Resources β
π HTB CTF Go-To Command β
A common Gobuster command for directory brute-forcing in HTB CTFs:
bash
gobuster dir -u http://10.10.10.10/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 40 -x php,txt,html -o gobuster_results.txt-u: Target URL (replace with the actual target IP)-w: Wordlist path-t 40: Use 40 threads for speed-x: File extensions to check-o: Output results to a file
