Skip to main content

Dirb

For all the info: dirb or https://www.kali.org/tools/dirb/


  • Default usage: dirb http://IP/
  • Use with wordlist: dirb http://IP/ /usr/share/dirb/wordlists/small.txt
  • With a specific user agent: -a "useragent"
  • With a specific cookie: -c "COOKIE:XYZ"
  • With username and password: -u "username:password"
  • Not recursive: -r If not set, once it found one directory, it continue to that directory only. This is usefull if we need all the directories before digging deeper.
  • Silent mode: -S if used, only shows the found directories.
  • Extensions -X ".php,.bak" or -x filewithextensions. It also search for a file with these extensions for every directory.
  • Save results into a file: o file

With Burp Proxy

First, we open Burp Suite Intercept to off We specify the proxy: dirb http://IP/ -p http://127.0.0.1:8080 Example:

dirb http://192.15.42.3 /usr/share/dirb/wordlists/small.txt -p http://127.0.0.1:8080

e0b255916807f51d0a18beef19fad131.png

And to see the results faster, we can filter using the "Status" or "Length"

6d0c9a238181ed33dbc76cdd31bb1b9e.png