00:05So, what we're going to build is a directory scanner.
00:08What hackers will often do when they have a target website is scan that website for
00:12possible directories.
00:13They do that because many websites are made with a content management system and an administrative
00:18system that allows you to change the complete website and also to insert scripts and all
00:23that.
00:23That famous content management systems are WordPress, Drupal and others.
00:29And it might be also that there is no content management system but the owner of the website
00:35forgot to delete some files or directories that may provide you more information on how
00:39to get into the system.
00:42So, for example on Kali Linux there is a default tool called GoBuster and let me just enlarge
00:48the font here.
00:52And as I said many websites have an administrative panel which you can then leverage to gain
00:57more access.
00:58So, you can brute force into that panel with username and password and then from there try
01:04to gain no access into the machine.
01:07So, a famous program is called GoBuster.
01:11So, it's included by Kali Linux in default and what it does is using your target website,
01:20it goes over a word list and tries to open slash with any words in the word list.
01:24So, if I show you the contents of that word list, let's say the first 100 lines, you'll see they
01:33are all like files that might be of interest and also directories.
01:40So, this is a very large file.
01:43So, you'll see maybe there is a conf directory or common directory or CMS directory or whatever
01:51directory.
01:52So, what this GoBuster tool does is for every word, it does slash, for example, slash conf, it checks if
02:00that
02:00exists, slash conference, slash conferences.
02:03So, the idea is to find hidden files and directories that you can leverage to gain more access into the
02:08computer, in this case the WordPress.com computer.
02:10So, if I press enter, you'll see it starts scanning the websites for files or directories that exist.
02:19You'll see it's discovering directories.
02:21Let me break it and for example, there's the WP admin directory.
02:25So, in the WordPress.com, in the WordPress system, usually the administration panel of the website for
02:34a WordPress system is WP admin.
02:36So, if I go to that website, it just takes a moment or so to load and we'll go to
02:45WordPress.com, WP admin.
02:50So, now we discovered the administration panel of the WordPress website.
02:56So, you can use this technique for any website and find login panels or hidden directories,
03:02hidden files that you can then use to leverage access into your system.
03:09So, what we're going to do is to build a similar program as GoBuster to scan a website,
03:15so any website you provide for the common words.
Comments