📂Directory Scanning

Gobuster Scan

#gobuster

Big List

gobuster dir -u http://192.168.120.14/cms/api -w /usr/share/wordlists/dirb/big.txt
gobuster dir -u http://192.168.120.13:81 -w /usr/share/wordlists/dirb/big.txt -x php

exclude 403 codes from results

gobuster dir -u http://auto.lab.io -w /usr/share/wordlists/dirb/big.txt -b 403,404

exclude length 4856 and ignore TLS certs

gobuster dir -u https://lab:20000 -w /usr/share/wordlists/dirb/big.txt -k --exclude-length 4856

Megabeast List

gobuster dir -u http://192.168.10.14/ -w /usr/share/wfuzz/wordlist/general/megabeast.txt

Common List

gobuster dir -u http://auto.lab.io -w /usr/share/wordlists/dirb/common.txt -b 403,404

Wordlist for things like (.git, .env)

gobuster dir -u http://192.168.7.10:8080/ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt

Wordlist for Directories:

feroxbuster -u http://192.168.1.6/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt
feroxbuster -u http://sub.domain.lab/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-big.txt

A wordlist for things like (README.md)

feroxbuster -u http://192.168.12.46/ -w /usr/share/wordlists/seclists/Discovery/Web-Content/quickhits.txt

Exclude response codes

feroxbuster -u http://usage.htb/ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -C 503

With Authentication

with basic authentication

gobuster dir -u http://192.168.22.20 -w /usr/share/wordlists/dirb/big.txt -U user -P 'Password123!'

API Scan

Create a simple pattern file

echo  {GOBUSTER}/v1 > pattern
echo  {GOBUSTER}/v2 >> pattern

Look for other APIs with that pattern

gobuster dir -u http://192.168.23.150:8080/ -w /usr/share/wordlists/dirb/big.txt -p pattern

Feroxbuster

#feroxbuster

Without -r, it only recurses into redirected directories (301)

feroxbuster -u http://192.168.120.143 -w /usr/share/wordlists/dirb/big.txt

Recursive scanning to find subdirectories, With -r, it will brute-force all directories it finds, not just ones redirected to.

feroxbuster -u http://192.168.136.225:8090 -w /usr/share/wordlists/dirb/common.txt -r -t 40

With Authentication

feroxbuster -u http://192.168.22.20 -w /usr/share/wordlists/dirb/big.txt -H "Authorization: Basic $(echo -n 'User:Password123!' | base64)"

ffuf

#ffuf

basic url fuzzing

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt

Allows fuzzing on insecure SSL/TLS connections.

ffuf -u https://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -k

Filter our 404 responses

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -fc 404

Enables recursive fuzzing up to 2 directory levels.

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -r -recursion-depth 2

With Authentication

#ffuf_authenticated

Adds an Authorization header to the requests.

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -H "Authorization: Bearer token"

Sends the cookie session=abc123 with each request

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -b "session=abc123"

base64 basic authentication

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -H "Authorization: Basic dLNlcm5hbmU6cGFlc32vcmQ="

Or

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -H "Authorization: Basic $(echo -n 'username:password' | base64)"

Post data fuzzing

ffuf -u http://192.168.212.220/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -X POST -d "username=admin\&password=FUZZ"