Skip to content

DirBuster

DirBuster is a multi-threaded Java application designed to brute-force directories and file names on web/application servers. It’s particularly useful during penetration tests to uncover hidden paths and sensitive files.

DirBuster is part of the OWASP project and comes pre-installed in distributions like Kali Linux.


DirBuster works by using a wordlist to send HTTP requests to the target server, attempting to discover:

  • Hidden directories (e.g., /admin/, /backup/)
  • Sensitive files (e.g., config.php, db.sql)
  • Access control misconfigurations

It supports recursive brute-forcing and custom file extensions.


Terminal window
dirbuster
Terminal window
java -jar /path/to/DirBuster.jar

  1. Target URL: Enter the base URL (e.g., http://192.168.1.100)
  2. Wordlist: Choose a wordlist (e.g., from /usr/share/wordlists/dirbuster/)
  3. File Extensions: Add common extensions (.php, .html, etc.)
  4. Threads: Set the number of threads (10–50 is typical)
  5. Start Scan: Click “Start” to begin brute-forcing

Common wordlists for DirBuster:

  • /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
  • /usr/share/wordlists/dirb/common.txt
  • SecLists: /usr/share/seclists/Discovery/Web-Content/

FeatureDescription
GUI-BasedUser-friendly interface for real-time monitoring
Recursive ScanningAutomatically explores found directories
File Extension SupportAllows appending file extensions during brute force
Custom HTTP HeadersSupports custom headers for advanced testing

  • During web application penetration tests
  • When you want visual monitoring of brute-force attempts
  • For recursive scanning of deeply nested directories

  • Slower than command-line tools like Gobuster or ffuf
  • Noisy – can easily trigger IDS/WAF alerts
  • Java-based – can be less stable and more resource-intensive

  • Use multiple wordlists (start small, then go deeper)
  • Watch for response codes: 200, 403, 401, 301
  • Combine with Burp Suite to manually probe interesting results
  • Look out for default directories like /admin/, /login/, /test/, /old/

If you prefer CLI tools over GUI: