Dirb
Last updated
Last updated
Dirb is a popular web content scanner designed to discover hidden directories and files on web servers. It's commonly used by penetration testers to identify potential entry points and sensitive information exposed on web applications. This guide provides an overview of how to use Dirb effectively for web content enumeration during penetration testing.
Prerequisites:
Basic understanding of web technologies and HTTP protocol.
Dirb installed on your system. You can download it from .
How to use:
Identify Target Web Application:
Determine the URL of the web application you want to perform content enumeration on.
Perform Basic Scan:
Open your terminal or command prompt.
Run Dirb with the target URL.
Example command:
Replace <target_URL>
with the URL of the target web application.
Output Results to File:
Use the -o
flag to specify the output file for the scan results.
Example command:
This command saves the scan results to a file named scan_results.txt
.
Perform Recursive Scan:
Use the -r
flag to enable recursive scanning, allowing Dirb to explore subdirectories within the discovered directories.
Example command:
This command instructs Dirb to continue scanning recursively.