dirb

DIRB is a web content scanner used to discover hidden directories and files on a web server. It works by brute-forcing URLs based on predefined wordlists, helping security professionals identify potential vulnerabilities.

Usage

The basic syntax for running DIRB is:

dirb <url_base> [<wordlist_file(s)>] [options]

Where:

  • <url_base> is the target website or directory to scan.

  • <wordlist_file(s)> specifies the wordlist(s) used for enumeration.

  • [options] allows customization of the scan behavior.

Examples

1. Simple Directory Scan

To perform a basic scan of a directory:

dirb http://url/directory/

This scans the specified URL using the default wordlist.

2. Scanning for Specific File Extensions

DIRB allows searching for specific file types, such as .html:

dirb http://url/ -X .html

This command appends .html to each word in the wordlist, checking for the presence of these files.

3. Using a Custom Wordlist

DIRB supports custom wordlists, such as the Apache vulnerabilities wordlist:

dirb http://url/ /usr/share/dirb/wordlists/vulns/apache.txt

This command scans the target using a specific wordlist containing Apache-related vulnerabilities.

Last updated