Skip to playerSkip to main content
In this video, you will learn what Gobuster is and how it is used in cybersecurity and penetration testing. Gobuster is a popular directory and DNS brute-forcing tool used by ethical hackers to discover hidden files, directories, and subdomains on web servers.

Understanding how Gobuster works is important for anyone learning ethical hacking and web application security.

What you will learn:

. What is Gobuster

. How Gobuster works

Gobuster is commonly used during the reconnaissance phase of penetration testing to uncover hidden attack surfaces.

⚠ This video is for educational and ethical cybersecurity purposes only. Always test tools in authorized lab environments.

This lesson is part of the course: Building Python Tools for Cybersecurity.

What is Gobuster? | Gobuster Explained for Cybersecurity Beginners

#gobuster #WhatIsGobuster #cybersecurity #ethicalhacking #pentesting #websecurity #reconnaissance #cybersecurity #ethicalhacking #hjcyberx

Category

📚
Learning
Transcript
00:05So, what we're going to build is a directory scanner.
00:08What hackers will often do when they have a target website is scan that website for
00:12possible directories.
00:13They do that because many websites are made with a content management system and an administrative
00:18system that allows you to change the complete website and also to insert scripts and all
00:23that.
00:23That famous content management systems are WordPress, Drupal and others.
00:29And it might be also that there is no content management system but the owner of the website
00:35forgot to delete some files or directories that may provide you more information on how
00:39to get into the system.
00:42So, for example on Kali Linux there is a default tool called GoBuster and let me just enlarge
00:48the font here.
00:52And as I said many websites have an administrative panel which you can then leverage to gain
00:57more access.
00:58So, you can brute force into that panel with username and password and then from there try
01:04to gain no access into the machine.
01:07So, a famous program is called GoBuster.
01:11So, it's included by Kali Linux in default and what it does is using your target website,
01:20it goes over a word list and tries to open slash with any words in the word list.
01:24So, if I show you the contents of that word list, let's say the first 100 lines, you'll see they
01:33are all like files that might be of interest and also directories.
01:40So, this is a very large file.
01:43So, you'll see maybe there is a conf directory or common directory or CMS directory or whatever
01:51directory.
01:52So, what this GoBuster tool does is for every word, it does slash, for example, slash conf, it checks if
02:00that
02:00exists, slash conference, slash conferences.
02:03So, the idea is to find hidden files and directories that you can leverage to gain more access into the
02:08computer, in this case the WordPress.com computer.
02:10So, if I press enter, you'll see it starts scanning the websites for files or directories that exist.
02:19You'll see it's discovering directories.
02:21Let me break it and for example, there's the WP admin directory.
02:25So, in the WordPress.com, in the WordPress system, usually the administration panel of the website for
02:34a WordPress system is WP admin.
02:36So, if I go to that website, it just takes a moment or so to load and we'll go to
02:45WordPress.com, WP admin.
02:50So, now we discovered the administration panel of the WordPress website.
02:56So, you can use this technique for any website and find login panels or hidden directories,
03:02hidden files that you can then use to leverage access into your system.
03:09So, what we're going to do is to build a similar program as GoBuster to scan a website,
03:15so any website you provide for the common words.
Comments

Recommended