πŸ‘¨β€πŸ’»
Jawad's Notes
  • πŸ‘¨β€πŸ«INFOSEC
    • πŸ•ΈοΈWeb
      • Burp Suite: Setting Foxyproxy
      • XSS
      • Wappalyzer
      • Directory Traversal
      • LFI
        • PHP Wrappers
        • RFI
      • Reverse Shell
        • Command Injection Quick Tips
      • File Upload
      • WPScan
      • SQL Injection
        • Schemas
        • SQLmap
        • MSSQL
        • MySQL
        • PostgreSQL
    • πŸ”§Tools
      • Whois
      • DNSRecon
      • DNSenum
      • nslookup
      • Netcat
        • Powercat
      • Nmap
        • Nmap Scripting Engine
        • Test-NetConnection
        • Grep
      • Server Message Block (SMB)
      • SNMP
      • SMTP
      • ExifTool
      • Search Engine Hacking
      • Source Control Hacking
      • Nessus
      • Canarytokens
      • Qualys SSL Server Test
      • Security Headers
      • theHarvester
      • Shodan
      • Gobuster
        • Dirb
      • Searchsploit
      • Password Cracking
        • Hashcat
        • John The Ripper
        • Hydra
        • hashID
        • CPU vs GPU
    • 🐧Linux
      • Symbols
      • cat
      • curl
      • openvpn
      • tcpdump
      • Remote Desktop
      • SmbShare
      • Tmux
      • Convert Windows-style line endings (CRLF) to Unix-style (LF)
      • SSH
    • πŸ–₯️Macros in Office
    • 🍎Enhancing Your MacOS Terminal Experience
    • 🚩CTF
      • SQL Injection
        • WHERE clause allowing retrieval of hidden data
        • Allowing login bypass
        • UNION attack, determining the number of columns returned by the query
        • UNION attack, finding a column containing text
        • UNION attack, retrieving data from other tables
        • UNION attack, retrieving multiple values in a single column
        • Querying the database type and version on Oracle
Powered by GitBook
On this page
  1. INFOSEC
  2. Tools
  3. Gobuster

Dirb

Dirb is a web content scanner and an essential tool in the arsenal of penetration testers and security researchers. It's designed to brute-force discover interesting directories and files on web servers. Using wordlists, Dirb will systematically check for the existence of specific paths, revealing hidden directories, vulnerable scripts, and potential points of entry that are not typically found through traditional browsing.

Basic Usage of Dirb

To start using Dirb, you enter the command followed by the URL of the target website. Here are a few command examples to demonstrate how Dirb can be utilized effectively:

Basic Directory Scanning: To scan a website for common directories:

dirb http://example.com

This command uses the default wordlist to search for directories on http://example.com.

Using a Specific Wordlist: If you have a specific set of paths you want to check, you can specify a custom wordlist:

dirb http://example.com /usr/share/dirb/wordlists/common.txt

Here, common.txt is the wordlist file that contains the paths Dirb will check.

Ignoring Errors: Sometimes you may want to ignore error messages from the server:

dirb http://example.com -z

The -z option tells Dirb to proceed without pausing for error messages.

Saving Output to a File: For better analysis, you might want to save the scan results to a file:

dirb http://example.com -o results.txt

This command saves the output of the scan into results.txt, allowing for easy review and record-keeping.

Scanning with HTTPS: To scan a secure website that uses HTTPS:

dirb https://securewebsite.com

This ensures that Dirb checks the site using the HTTPS protocol.

Adjusting Connection Settings: You can modify the connection settings for timeouts and retries:

dirb http://example.com -t 20 -r 3

The -t option sets the timeout for each test to 20 seconds, and -r sets the number of retries to 3.

These examples highlight how Dirb can systematically uncover hidden web resources that could be leveraged for deeper penetration testing or security assessments. By effectively mapping web applications, security professionals can identify and secure potentially vulnerable endpoints and scripts.

PreviousGobusterNextSearchsploit

Last updated 1 year ago

πŸ‘¨β€πŸ«
πŸ”§