Pentest Tools


Gobuster Cheatsheet

How to Install Gobuster

Gobuster installation:

Installation
username@machine_name:~$ sudo apt install gobuster

Useful Commands for Gobuster


-u [URL]: Specify the target URL
-w [WORDLIST]: Specify the wordlist to use
-x [EXTENSIONS]: Specify file extensions to look for (e.g., php, txt)
-t [THREADS]: Specify the number of threads to use
-e: Show full URLs in the output
-k: Skip SSL/TLS certificate verification
-o [OUTPUT]: Specify an output file
dir: Use directory/file mode
dns: Use DNS subdomain mode
s3: Use AWS S3 bucket mode
vhost: Use virtual host mode

Examples of Gobuster Commands

Directory and file brute-forcing:

Directory Brute-force
username@machine_name:~$ gobuster dir -u http://example.com -w /path/to/wordlist.txt

DNS subdomain brute-forcing:

DNS Brute-force
username@machine_name:~$ gobuster dns -d example.com -w /path/to/wordlist.txt

Brute-forcing with specified extensions:

File Extensions
username@machine_name:~$ gobuster dir -u http://example.com -w /path/to/wordlist.txt -x php,txt

Skipping SSL/TLS certificate verification:

Skip SSL Verification
username@machine_name:~$ gobuster dir -u https://example.com -w /path/to/wordlist.txt -k

Specifying number of threads:

Set Threads
username@machine_name:~$ gobuster dir -u http://example.com -w /path/to/wordlist.txt -t 50

Saving output to a file:

Output to File
username@machine_name:~$ gobuster dir -u http://example.com -w /path/to/wordlist.txt -o output.txt