Gobuster
Created: 2026-03-03 12:19
#quicknote
Gobuster is a fast command-line brute-forcing tool written in Go, used by penetration testers for discovering hidden directories, subdomains, and virtual hosts. Its Go-based concurrency makes it significantly faster than older alternatives like DirBuster or Dirb. Gobuster is typically used during web application enumeration after Port scanning identifies HTTP/HTTPS services, as part of the Information Gathering phase.
dirmode — brute-forces URLs to find hidden directories and files (e.g.,/admin,/login.php,/backup.zip) on a web serverdnsmode — brute-forces subdomains of a target domain (e.g.,dev.target.com,staging.target.com) to map external attack surfacevhostmode — discovers hidden virtual hosts on a single IP, useful when multiple web applications are hosted on the same server but not in public DNSs3mode — scans for open or unsecured Amazon S3 buckets associated with a target
Basic Usage
Like SNMP Enumeration tools such as onesixtyone, Gobuster relies heavily on wordlists. Standard directory brute-force:
gobuster dir -u http://192.168.50.151 -w /usr/share/wordlists/dirb/common.txt
-uspecifies the target URL-wspecifies the wordlist
Note: Seclists (/usr/share/seclists/) provides more comprehensive wordlists for different scenarios. See Information Gathering for the full Seclists reference.
Resources
Tags
#oscp #web_enumeration #gobuster #cybersecurity #penetration_testing