Analyze Web Applications: Identify Files and Directories - enumerate applications, as well as hidden directories and files of the web application hosted on the web server.
Tools such as ☆Gobuster is directory scanner that allows attackers to perform fast-paced enumeration of hidden files and directories of a target web application.
# gobuster -u <target URL> -w common.txt (wordlist) (P.1849/1833)
Gobuster is a Go-programming-based directory scanner that allows attackers to perform fast-paced enumeration of hidden files and directories of a target web application. It is a command-oriented tool used to brute-force URIs in websites, DNS subdomains, names of virtual hosts on the target server, etc.
You can use -w option for using a particular wordlist, for example, common.txt or medium.txt to launch a brute-force attack for extracting web directories or files from inside the target URL.
gobuster -u http://192.168.1.108/dvwa -w /usr/share/wordlists/dirb/common.tx
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Daniel8660
6 months, 1 week agodinonino
7 months, 1 week agoTroyMcLure
7 months, 2 weeks agoKumaraRashu
1 year, 3 months agoegz21
1 year, 4 months agoGG_Security
1 year, 5 months agoshiftry
1 year, 5 months agoANDRESCB1988
1 year, 9 months ago