OWASP DirBuster – Bruteforcing the Web
DirBuster is a multi-threaded Java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these.
This tool is written by James Fisher and now an OWASP's Project, licensed under LGPL.
DirBuster provides the following features:
- Multi-threaded has been recorded at over 6000 requests/sec
- Works over both http and https
- Scan for both directory and files
- Will recursively scan deeper into directories it finds
- Able to perform a list based or pure brute force scan
- DirBuster can be started on any directory
- Custom HTTP headers can be added
- Proxy support
- Auto switching between HEAD and GET requests
- Content analysis mode when failed attempts come back as 200
- Custom file extensions can be used
- Performance can be adjusted while the program in running
- Supports Basic, Digest and NTLM auth
- Command line
- GUI interface
How works DirBuster?
It works with the "Fail Cases", for example, DirBuster will attempt to determine if something is available and if the test executed returns a result different from the "Fail Case".
It is very interesting to say that the lists were generated crawling the Internet and collecting the directory and files that are actually used by developers.
DirBuster has a total of 9 different lists:
- Apache User Enumeration 1.0
- Apache User Enumeration 2.0
- Directory List 1.0
- Directory List 2.3 Small
- Directory List 2.3 Medium
- Directory List 2.3 Big
- Directory List Lowercase 2.3 Small
- Directory List Lowercase 2.3 Medium
- Directory List Lowercase 2.3 Big
The directory lists are distributed under Creative Commons Attribution-Share Alike 3.0 License.
You can select the scanning type "Pure Brute Force" if you have time, and try with different Char set, setting the Max and Min Length.
Other interesting options are:
- Brute Force Dirs.
- Brute Force Files.
- Be Recursive.
- Use Blank Extension.
- Dir to start with (for example "/").
- File Extension.
Also you can put a URL and try it with fuzzing, for example:
What DirBuster can do for me?
Attempt to find hidden pages/directories unlinked, giving you another attack vector.
How does DirBuster help in the building of secure applications?
DirBuster is able to find content on the web server or within the application that is not required and from the developers point of view understand that by simply not linking to a page does not mean it cannot be accessed, the basic concept of “Security through obscurity”.
What DirBuster will NOT do for you?
Exploit anything it finds. This is not the purpose of this tool.
Installation & Usage
- Unzip or untar the download.
- cd into the program directory.
- To run the program java -jar DirBuster-0.10.jar (Windows uses should be able to just double click on the jar).
- Recommended list to use is directory-list-2.3-medium.txt.
DirBuster requires Java 1.6 or above.
Run DirBuster in headless mode.
java -jar DirBuster-0.12.jar -H -u https://www.target.com
Start GUI with target file prepopulated.
java -jar DirBuster-0.12.jar -u https://www.target.com
Maximiliano is a Security Analyst working in an International Bank and participating in some Projects like Vulnerability Database, Zero Science Lab, OWASP. Max is a fanatic of open standards.