Dirb
For all the info: dirb or https://www.kali.org/tools/dirb/
- Default usage:
dirb http://IP/ - Use with wordlist:
dirb http://IP/ /usr/share/dirb/wordlists/small.txt - With a specific user agent:
-a "useragent" - With a specific cookie:
-c "COOKIE:XYZ" - With username and password:
-u "username:password" - Not recursive:
-rIf not set, once it found one directory, it continue to that directory only. This is usefull if we need all the directories before digging deeper. - Silent mode:
-Sif used, only shows the found directories. - Extensions
-X ".php,.bak"or-x filewithextensions. It also search for a file with these extensions for every directory. - Save results into a file:
o file
With Burp Proxy
First, we open Burp Suite
Intercept to off
We specify the proxy: dirb http://IP/ -p http://127.0.0.1:8080
Example:
dirb http://192.15.42.3 /usr/share/dirb/wordlists/small.txt -p http://127.0.0.1:8080

And to see the results faster, we can filter using the "Status" or "Length"
