

We can use the wordlist of dirb and dirbuster but there is another very good wordlist that I like to use for directory brute-forcing. Although in Kali Linux we have some word lists located in /usr/share/wordlist directory. Gobuster needs a good wordlist for brute-forcing. Now let’s explore a bit in more detail how we can use this. So, we will stick to the “DIR mode” & “DNS mode”. I’ve told you before that this tool is mostly used for subdomain and directory brute-forcing. DIR – The classiC directory brute-forcing mode.


Kali Linux is one of the most favorite penetration testing Linux distribution in the infosec community. Let’s see the Gobuster installation process in the next point. Once you’ve set up Kali Linux in WSL 2, then you can easily install Gobuster in it. Here is a very nice and short video tutorial by Networkchuck to set up Kali Linux on WSL 2 on your Windows 10 PC. Windows Subsystem for Linux ( WSL) is a compatibility layer for running Linux binary executables (in ELF format) natively on Windows 10 and Windows Server 2019. The easiest way to install Gobuster in Windows 10 is by using it in WSL 2 (Windows Subsystem for Linux). We will be using it on our vulnerable application, DVWA (Damn Vulnerable Web Application), but you can use it similarly on live websites. All in all, it’s an amazing and very effective tool that you should start using it. Gobuster has a simple command-line interface which works very fine. It has also excellent support for concurrency so that Gobuster can take advantage of multiple threads for faster processing. The main advantage of Gubuster over other directory scanning tools is Speed. There are lots of other tools as well like Dirbuster & DIRB which we can use for scanning subdomains and directories, but they can often be slow and give errors. So that we can find the hidden Subdomains and Directories of that web application, by which we may find a vulnerable point which we can exploit that easily. It’s a very important step to enumerate hidden subdomains and directories before attacking a web application. Why we should use Gobuster in Penetration Testing? Why we should use Gobuster in Penetration Testing?.
