[TOC] ###### tags: `tools` `web` `enumerate` -u The target URL -w Path to your wordlist -t -x **gobuster dir -u http://<ip>:3333 -w <word list location>**  dir (commnad) # DIR ## 尋找特定 extension file (-e) ``` ┌──(root㉿Meowhecker)-[/home/meowhecker] └─# gobuster dir -u http://jewel.uploadvulns.thm/content -w ./UploadVulnsWordlist.txt -x jpg -t 300 =============================================================== Gobuster v3.4 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) =============================================================== [+] Url: http://jewel.uploadvulns.thm/content [+] Method: GET [+] Threads: 300 [+] Wordlist: ./UploadVulnsWordlist.txt [+] Negative Status codes: 404 [+] User Agent: gobuster/3.4 [+] Extensions: jpg [+] Timeout: 10s =============================================================== 2023/06/23 16:15:07 Starting gobuster in directory enumeration mode =============================================================== /ABH.jpg (Status: 200) [Size: 705442] /EGB.jpg (Status: 200) [Size: 279603] /LKQ.jpg (Status: 200) [Size: 444808] Progress: 21605 / 35154 (61.46%)[ERROR] 2023/06/23 16:15:46 [!] Get "http://jewel.uploadvulns.thm/content/MKZ.jpg": context deadline exceeded (Client.Timeout exceeded while awaiting headers) /SAD.jpg (Status: 200) [Size: 247159] /STF.jpg (Status: 200) [Size: 279603] /UAD.jpg (Status: 200) [Size: 342033] ```
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up