Gobuster
is a command-line tool used for brut-forcein:
- URLs (directories and files) on web servers
- DNS subdomains
- Virtual Hostnames
- Amazon S3 buckets.
Common Modes
- dir → Brute-force directories/files
- dns → Brute-force DNS subdomains
- vhost → Brute-force virtual hostnames
- s3 → Brute-force S3 buckets
Directory Brute Forcing (Most Common)
gobuster dir -u http://192.168.0.101 -x html,txt,php,js,py -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100
Useful flags
-u
= URL of the target-w
= Wordlist path-x
= File extensions (like .php,.html,.txt)-t
= Number of threads (default is 10)-o
= Output file to save results-q
= Quiet mode – only shows found results--wildcard
= Useful for wildcard response detection-k
= Skip SSL/TLS certificate verification-s
= Show only specific status codes (e.g., 200)
DNS Subdomain Brute Forcing
gobuster dns -d example.com -w /usr/share/wordlists/dns/subdomains-top1million-5000.txt
Extra Flags :
-i
= Show IP addresses of discovered subdomains.-d
= Domain name.
VHOST Brute Forcing
gobuster vhost -u http://example.com -w /usr/share/wordlists/dns/subdomains-top1million-5000.txt
This is used when name-based virtual hosting is suspected.