Gobuster Cheatsheet


Gobuster is a tool used to brute-force:

  • URIs (directories and files) in web sites.
  • DNS subdomains (with wildcard support).
  • Virtual Host names on target web servers.

Dir mode

To find directories and files

Sintaxis:

gobuster dir -u <url> -w <wordlist_file.txt> -x <file_extensions>

Example:

gobuster dir -u http://workers.htb -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x php,php3,html

vhost mode

Check if subdomain exists by visiting url and verifying the IP address

Sintaxis:

gobuster vhost -v -w <wordlist.txt> -u <url> -o <output_file.txt>

Example:

gobuster vhost -v -w /home/username/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -u http://workers.htb -o vhosts.txt

Examples of results:

Missed: pgadmin.worker.htb (Status: 200) [Size: 703]
Missed: web3.worker.htb (Status: 200) [Size: 703]
Found: abc.worker.htb (Status: 200) [Size: 6495]
Found: def.worker.htb (Status: 200) [Size: 16045]

dns mode

To find subdomains in a specific domain

Sintaxis

gobuster dns -d <domain> -w <word_list.txt> -i

Example:

gobuster dns -d workers.htb -w /home/username/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -i

Notes:

-k to skip SSL verification