Gobuster is a tool used to brute force URLs (directories and files) from websites, DNS subdomains, Virtual Hostnames, and open Amazon S3 buckets. It can be particularly useful during CTF challenges that require you to brute force web server data, but also during pentest engagements.
Install Gobuster
First, you need to make sure you have Go installed on your Linux distribution, which is the programming language used to write the Gobuster tool. Once all the dependencies are satisfied for Go, you can proceed to download and install go-buster. In order to install Go, you need to input the following command in your terminal window:
Once that installation is complete, you can proceed with installing the go-buster. If you have a Go environment ready to go, it is as easy as typing in the following command in your terminal:
Using Gobuster
In order to start our directory busting, we will need to discover what capabilities go buster has, and which ones can assist us. By looking at the tool's help page, by typing in the gobuster -h command in our terminal, we receive a list of all possible switches for the tool and their description.
- dir - the classic directory brute-forcing mode
- dns - DNS subdomain brute-forcing mode
- s3 - Enumerate open S3 buckets and look for existence and bucket listings
- vhost - virtual host brute-forcing mode (not the same as DNS!)