• We just launched and are currently in beta. Join us as we build and grow the community.

UrlBuster – A Powerful Web Hidden Files or Directories Finder

mic141414

Patch Tester
M Rep
0
0
0
Rep
0
M Vouches
0
0
0
Vouches
0
Posts
52
Likes
197
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Simple-Purple-and-White-Modern-Professional-Healthcare-Medical-Presentation.png


Hey Folks, In this tutorial we are going to discuss an github tool called “URLBuster”. The tool is similar to dirb or gobuster, but has a lot of manipulation options and is designed for web directory fuzzer to locate existing and / or hidden files or directories.

Features
  • Proxy support
  • Cookie support
  • Basic Auth
  • Digest Auth
  • Retries (for slow servers)
  • Persistent and non-persistent HTTP connection
  • Request methods: GET, POST, PUT, DELETE, PATCH, HEAD, OPTIONS
  • Custom HTTP header
  • Mutate POST, PUT and PATCH payloads
  • Mutate with different request methods
  • Mutate with different HTTP headers
  • Mutate with different file extensions
  • Mutate with and without trailing slashes
  • Enumerate GET parameter value

Lets take a look 🙂 !!

Installation

Installation is not difficult, but we should have a pip tool in our system from which we will download it. If you do not have it, you can use the following command and download the pip tool.

apt-get install python-pip1apt-get install python-pip

1-21.png


Now the time to install this tool and through the below given command we will easily configure it on our system.

pip install urlbuster1pip install urlbuster

2-22.png


All has been done and now we will execute the help command which will give us all the usage details of this tool.

urlbuster --help1urlbuster--help

3-23.png


You can see the basic usage of this tool through giving the image below but we will take an example.

4-22.png

Fuzzing with Word list

In this tool we have to give the wordlist otherwise it will not work so you can see the code given below and manipulate the target and the wordlist according to your requirement. After executing the command you will see all the settings that it will use during fuzzing.
Usage 🙂 urlbuster -W < location > < target >

urlbuster -W /root/wordlist.txt http://192.168.0.104/1urlbuster-W/root/wordlist.txt http://192.168.0.104/

5-19.png


Nice 🙂 Observe the results and see how important directories and files we got from executing the above command.

6-19.png

No TLS Verification

When we visit any website then first TLS handshake processed and if the handshakes succeed then client and server both can communicate and transfer the data to each other. But through this facility we can get the information anonymously without TLS verification.

urlbuster -k -W /root/wordlist.txt http://192.168.0.104/1urlbuster-k-W/root/wordlist.txt http://192.168.0.104/

7-17.png

New Connection

This feature will help to anonymous itself becuase new connection for every request and if not specified persistent http connection will be used for all requests.

urlbuster -k -n -W /root/wordlist.txt http://192.168.0.104/1urlbuster-k-n-W/root/wordlist.txt http://192.168.0.104/

8-13.png

Verbose

This features will give us the brief details such as : missed URLs, redirection, response code etc. Just we will add “-v” parameter in our search.

urlbuster -k -n -W /root/wordlist.txt http://192.168.0.104/ -v1urlbuster-k-n-W/root/wordlist.txt http://192.168.0.104/ -v

9-13.png


After adding this one we have got status code of the all HTTP requests.

10-13.png

HTTP status code

HTTP status code to treat as success and if we only want to see the specific HTTP response or status code then we go with it. We can add more response code through giving the space.

urlbuster -W /root/wordlist.txt http://192.168.0.104/ --code 2001urlbuster-W/root/wordlist.txt http://192.168.0.104/ --code 200

11-11.png


Here you can see that we got only 200 HTTP response results.

12-11.png

Change Header

To keep anonymous yourself we can set custom http header string which will be send to the server and the victim will not identify the exact details about the target.

urlbuster -W /root/wordlist.txt http://192.168.0.104/ --header key:ubuntu1urlbuster-W/root/wordlist.txt http://192.168.0.104/ --header key:ubuntu

13-8.png

Method

Sometimes we need to send the request to the server in a different way which depends on the situation, we can use this feature in it.

urlbuster -W /root/wordlist.txt http://192.168.0.104/ --method POST1urlbuster-W/root/wordlist.txt http://192.168.0.104/ --method POST

14-7.png


Done 🙂 !! Now you can see that the request has successfully gone with POST method and similarly we can use all these attributes to get better results.

15-5.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

431,395

312,441

312,450

Top