Examples (commands + tips) S3 / bucket discovery: gobuster s3 -b target-bucket -w wordlists/s3-bucket-list.txt -t 40 Enumerate S3/GCS prefixes or buckets (with permission). POST method fuzzing: gobuster dir -u https://target.example.com/ -w wordlists/custom.txt -m POST -H "Content-Type: application/x-www-form-urlencoded" --data "id=FUZZ" -t 10 Use POST when endpoints accept only POST. Proxy via Burp: gobuster dir -u https://target.example.com/ -w wordlists/raft-small.txt -t 20 --proxy http://127.0.0.1:8080 Inspect requests in Burp.
Examples (commands + tips) Authenticated scan (Basic): gobuster dir -u https://target.example.com/ -w wordlists/common.txt -t 20 -A "user:password" Scan behind Basic Auth. JSON output: gobuster dir -u https://target.example.com/ -w wordlists/common.txt -t 30 -o results.json -f Save full JSON for parsing. Wildcard DNS handling: gobuster dns -d example.com -w subdomains.txt -t 40 -r 8.8.8.8 -o dns_out.txt Query specific resolver; verify suspicious hits manually.
Applications (Use-cases) Web recon / content discovery (pentests, bug bounties) Subdomain discovery for attack surface mapping Integration in recon scripts and CI for asset discovery Combined use with Burp, Nuclei, scanners for validation
Limitations & Caveats Wildcard DNS causes false positives in DNS mode Aggressive scans trigger WAF/IDS — tune threads/delay Depends on wordlist quality; not intelligent response analysis Not ideal alone for large-scale DNS enumeration
References GitHub: https://github.com/OJ/gobuster (releases & docs) Wordlists: SecLists (github.com/danielmiessler/SecLists) Kali Tools & Tutorials: Kali docs, community writeups
Next steps / Extras Want a script to run safe scans against a lab VM? I can add it. I can also produce 4–5 screenshot-ready terminal runs for your video.