Comprehensive Guide On Dirb Tool
Comprehensive Guide On Dirb Tool
Comprehensive Guide On Dirb Tool
Source: https://www.owasp.org/index.php/Path_Traversal
Requirements
Table of Content
Introduction to DIRB
Utilizing Multiple Wordlist for Directory Traversing
Default working of Dirb
Enumerating Directory with Specific Extension List
Save Output to Disk
Ignore Unnecessary Status-Code
Default Working Vs Not stop on WARNING messages
Working
Speed delay
Not recursively (-r)
Show NOT Existence Pages
Extension List (-X parameter) Vs Extension Header (-H
parameter)
Not forcing an ending ‘/’ on URLs (-t)
HTTP Authentication (-u username: password)
What is DIRB?
Source: https://tools.kali.org/web-applications/dirb
Tool DIRB is built-in Kali Linux. Open the terminal and type the
following command to get an overview of the tools included
in the package:
dirb
You can see from the image below that there are so many text
files as wordlist; we can use them as required.
As you can grasp from the given screenshot that the dirb scan
is ignoring the NOT FOUND code that is., 302.
Default Working Vs Nonstop on WARNING messages
Working
During the normal dirb scan as shown below, some of the
pages generate warnings; the dirb scan skips those directories
where it encounters any warnings.
1 dirb http://192.168.1.106/
While doing a scan that is to be done very deeply and
verbosely, we want that the dirb scan to not avoid these
warnings and do an in-depth scan, hence we use the -w
parameter of the dirb scan.
1 dirb http://192.168.1.106/ -w
From given below the image you can observe it has also
extracted all those directories are relevant to 404 errors.
Extension List (-X parameter) Vs Extension Header (-
H parameter)
By using the –X parameter along with target URL with a
specific extension, for example, .php, it enumerates all file or
directory with .php extension, but by using –H parameter with
specific extension, for example .php along with target URL it
will enumerate all files or directories named with php as
shown in the given below image.
Try this attack once again with the same command with some
changes so in order to run that command we have to add –t in
the previous command.
1 dirb http://192.168.1.105/bwapp/portal.php -t
As a result, it is shown Status –code 200 for the test: test and
authorized credential on target URL.
Proxy URL
Using –p option enables proxy URL to be used for all requests,
by default it works on port 1080. As you can observe, on
exploring target network IP in the web browser it put up
“Access forbidden error” which means this web page is running
behind some proxy.
Share this:
Like this:
Like
Be the first to like this.
RAJ CHANDEL
Raj Chandel is a Skilled and Passionate IT Professional especially in IT-Hacking
Industry. At present other than his name he can also be called as An Ethical
Hacker, A Cyber Security Expert, A Penetration Tester. With years of quality
Experience in IT and software industry
PREVIOUS POST
← HACK THE BOX: DEVOOPS WALKTHROUGH
NEXT POST
MAGIC UNICORN – POWERSHELL DOWNGRADE ATTACK
AND EXPLOITATION TOOL →
Leave a Reply
Your email address will not be published. Required elds are marked *
Comment
Name *
Email *
Website
POST COMMENT
Search
ENTER KEYWORD
Subscribe to
Blog via Email
Email Address
SUBSCRIBE
Follow me on
Twitter
Hacking Articles
Retweeted
11h
Categories
BackTrack 5 Tutorials