Discovering hidden files/directories using DirBuster
In this recipe, we will learn to use the tool. The DirBuster tool looks for hidden directories and files on the web server. Sometimes, developers will leave a page accessible but unlinked; DirBuster is meant to find these files, which might have potential vulnerabilities. This is a Java-based application developed by awesome contributors at OWASP.
Getting ready
For this recipe, you will require an Internet connection.
How to do it...
- Launch DirBuster from the
Kali Linux
|Web Application Analysis
|Web Crawlers and Directory Brute
|Dirbuster
, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781783982165/graphics/c62dbe7e-f3aa-4298-bbe0-1d9ae8f7e52c.png)
Â
- Open and enter your target URL; in our case, we will enter
http://demo.testfire.net
for the purpose of demonstration, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781783982165/graphics/86b7ca3f-e7cd-446b-84a5-b81fea1ea789.png)
Â
- Select list based brute force. Browse and navigate to
/usr/share/dirbuster/wordlists
and selectdirectory_list_medium.txt
, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781783982165/graphics/fbaeab6e-e6e3-45e1-819a-71104d94cfa9.png)
Â
- Click on
Select List
and enterphp
(based...