gobuster_examples_cheatsheet_of_ubuntu.pptx

SudhanP4 8 views 12 slides Oct 28, 2025
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

terminal commands of gobuster


Slide Content

GoBuster — Examples & Cheat Sheet 12 ready-to-run examples + brief tips Prepared for your assignment

Intro (1 line) GoBuster: fast CLI tool for dir/file, DNS, vhost, S3 brute-forcing.

Installation (Quick) Debian/Ubuntu/Kali: sudo apt update && sudo apt install gobuster From source (recommended): go install github.com/OJ/gobuster/v3@latest Windows/macOS: download precompiled binaries from GitHub Releases

Basic Usage General: gobuster <mode> [flags] (modes: dir, dns, vhost, s3) Common flags: -u URL, -w wordlist, -t threads, -x extensions, -o output, -s status Help: gobuster --help or gobuster dir --help

Examples (commands + tips) Directory - basic: gobuster dir -u https://target.example.com/ -w /usr/share/wordlists/dirb/common.txt -t 50 -o gobuster-dir.txt Tip: lower -t for fragile servers. Directory - extensions: gobuster dir -u https://target.example.com/ -w wordlists/raft-small-directories.txt -x php,html,txt,bak -t 30 Find backups/configs. Directory - status filter: gobuster dir -u https://target.example.com/admin -w wordlists/common.txt -t 20 -s "200,301,302" -o admin_hits.txt Show only useful codes.

Examples (commands + tips) Directory - gentle scan: gobuster dir -u https://target.example.com/ -w wordlists/big.txt -t 10 --delay 500ms Avoid WAF/rate limits. Vhost discovery: gobuster vhost -u https://10.0.0.5 -w vhosts.txt -t 40 -o vhost-results.txt Find virtual-hosted apps via Host header. DNS / subdomain: gobuster dns -d example.com -w /usr/share/wordlists/dns/subdomains-top1million-100000.txt -t 100 -o dns.txt Beware wildcard DNS false positives.

Examples (commands + tips) S3 / bucket discovery: gobuster s3 -b target-bucket -w wordlists/s3-bucket-list.txt -t 40 Enumerate S3/GCS prefixes or buckets (with permission). POST method fuzzing: gobuster dir -u https://target.example.com/ -w wordlists/custom.txt -m POST -H "Content-Type: application/x-www-form-urlencoded" --data "id=FUZZ" -t 10 Use POST when endpoints accept only POST. Proxy via Burp: gobuster dir -u https://target.example.com/ -w wordlists/raft-small.txt -t 20 --proxy http://127.0.0.1:8080 Inspect requests in Burp.

Examples (commands + tips) Authenticated scan (Basic): gobuster dir -u https://target.example.com/ -w wordlists/common.txt -t 20 -A "user:password" Scan behind Basic Auth. JSON output: gobuster dir -u https://target.example.com/ -w wordlists/common.txt -t 30 -o results.json -f Save full JSON for parsing. Wildcard DNS handling: gobuster dns -d example.com -w subdomains.txt -t 40 -r 8.8.8.8 -o dns_out.txt Query specific resolver; verify suspicious hits manually.

Applications (Use-cases) Web recon / content discovery (pentests, bug bounties) Subdomain discovery for attack surface mapping Integration in recon scripts and CI for asset discovery Combined use with Burp, Nuclei, scanners for validation

Limitations & Caveats Wildcard DNS causes false positives in DNS mode Aggressive scans trigger WAF/IDS — tune threads/delay Depends on wordlist quality; not intelligent response analysis Not ideal alone for large-scale DNS enumeration

References GitHub: https://github.com/OJ/gobuster (releases & docs) Wordlists: SecLists (github.com/danielmiessler/SecLists) Kali Tools & Tutorials: Kali docs, community writeups

Next steps / Extras Want a script to run safe scans against a lab VM? I can add it. I can also produce 4–5 screenshot-ready terminal runs for your video.
Tags