Quantcast
Channel: Darknet – Hacking Tools, Hacker News & Cyber Security
Viewing all articles
Browse latest Browse all 257

DIRB – Domain Brute-forcing Tool

$
0
0

DIRB is a Web Content Scanner AKA a domain brute-forcing tool. It looks for existing (and/or hidden) Web Objects, it works by launching a dictionary based attack against a web server and analysing the responses.

DIRB - Domain Brute-forcing Tool

DIRB comes with a set of preconfigured attack word-lists for easy usage but you can use your custom word-lists. Also DIRB sometimes can be used as a classic CGI scanner, but do remember this is a content scanner not a vulnerability scanner.

There are other tools with similar functionalities such as:

Patator – Multi-threaded Service & URL Brute Forcing Tool
dirs3arch – HTTP File & Directory Brute Forcing Tool
DirBuster – Brute Force Directories & Files Names

And tools that can accomplish the same or similar things like:

Wfuzz v1.4 Released for Download – Bruteforcing & Fuzzing Web Applications

Usage

dirb

-----------------
DIRB v2.21
By The Dark Raver
-----------------

./dirb <url_base> [<wordlist_file(s)>] [options]

========================= NOTES =========================
 <url_base> : Base URL to scan. (Use -resume for session resuming)
 <wordlist_file(s)> : List of wordfiles. (wordfile1,wordfile2,wordfile3...)

======================== HOTKEYS ========================
 'n' -> Go to next directory.
 'q' -> Stop scan. (Saving state for resume)
 'r' -> Remaining scan stats.

======================== OPTIONS ========================
 -a <agent_string> : Specify your custom USER_AGENT.
 -c <cookie_string> : Set a cookie for the HTTP request.
 -f : Fine tunning of NOT_FOUND (404) detection.
 -H <header_string> : Add a custom header to the HTTP request.
 -i : Use case-insensitive search.
 -l : Print "Location" header when found.
 -N <nf_code>: Ignore responses with this HTTP code.
 -o <output_file> : Save output to disk.
 -p <proxy[:port]> : Use this proxy. (Default port is 1080)
 -P <proxy_username:proxy_password> : Proxy Authentication.
 -r : Don't search recursively.
 -R : Interactive recursion. (Asks for each directory)
 -S : Silent Mode. Don't show tested words. (For dumb terminals)
 -t : Don't force an ending '/' on URLs.
 -u <username:password> : HTTP Authentication.
 -v : Show also NOT_FOUND pages.
 -w : Don't stop on WARNING messages.
 -X <extensions> / -x <exts_file> : Append each word with this extensions.
 -z <milisecs> : Add a miliseconds delay to not cause excessive Flood.

======================== EXAMPLES =======================
 ./dirb http://url/directory/ (Simple Test)
 ./dirb http://url/ -X .html (Test files with '.html' extension)
 ./dirb http://url/ /usr/share/dirb/wordlists/vulns/apache.txt (Test with apache.txt wordlist)
 ./dirb https://secure_url/ (Simple Test with SSL)

You can download DIRB here:

dirb222.tar.gz

Or read more here.

The post DIRB – Domain Brute-forcing Tool appeared first on Darknet - The Darkside.


Viewing all articles
Browse latest Browse all 257

Trending Articles