Gobuster is a command-line tool used for brut-forcein:
- URLs (directories and files) on web servers
- DNS subdomains
- Virtual Hostnames
- Amazon S3 buckets.
Common Modes
- dir → Brute-force directories/files
- dns → Brute-force DNS subdomains
- vhost → Brute-force virtual hostnames
- s3 → Brute-force S3 buckets
Directory Brute Forcing (Most Common)
gobuster dir -u http://192.168.0.101 -x html,txt,php,js,py -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100
Useful flags
-u= URL of the target-w= Wordlist path-x= File extensions (like .php,.html,.txt)-t= Number of threads (default is 10)-o= Output file to save results-q= Quiet mode – only shows found results--wildcard= Useful for wildcard response detection-k= Skip SSL/TLS certificate verification-s= Show only specific status codes (e.g., 200)
DNS Subdomain Brute Forcing
gobuster dns -d example.com -w /usr/share/wordlists/dns/subdomains-top1million-5000.txt
Extra Flags :
-i= Show IP addresses of discovered subdomains.-d= Domain name.
VHOST Brute Forcing
gobuster vhost -u http://example.com -w /usr/share/wordlists/dns/subdomains-top1million-5000.txt
This is used when name-based virtual hosting is suspected.