LI - A Detailed Guide On Feroxbuster PDF
LI - A Detailed Guide On Feroxbuster PDF
Table of Contents
• Lab setup
• Installation
• Default mode
• Redirects
• Extensions
• Result output
• User agent
• Filter status code
• Quiet mode
• Controlling threads
• Custom wordlist
• Disable recursion
• Limit recursion depth
• Force Recursion
• Filter by character size
• Filter by number of words
• Filter by number of lines
• Filter by status code using deny list
• Filter by status code using allow list
• Generating random User-Agent
• HTTP methods
• Custom headers
• Cookies
• Adding slash
• Capturing requests in Burp
• Read target from list
• Resume from last state
• Follow redirect
• Timeout
• Comparasion between Feroxbuster and other tools
• Conclusion
Lab setup
After setting up a web server in the target machine, we can proceed with the
enumeration in the kali linux after installing Feroxbuster.
Installation
To install the Feroxbuster in kali linux, we can use the following command:
Default mode
Once we are done with the installation, we can proceed with the enumeration
part. To perform a default directory brute force, we can use the following the
command:
feroxbuster -u http://192.168.1.4
It can be seen from above that the wordlist used in default mode is the raft-
medium-directories.txt.
To get a less verbose output, we can use the --silent flag to hide the non-
essential data.
In order to allow the Feroxbuster to continue the directory brute forcing on the
redirected URL, we can use the -r or --redirect flag. For example if
http://192.168.1.4 redirects to http://192.168.1.4/newpath, Feroxbuster will
follow this redirection and continue to scan http://192.168.1.4/newpath for
directories and files.
feroxbuster -u http://192.168.1.4 -r
Extensions
If we want to log the output, we use the --output flag and then mentioning the
file name.
User agent
To set up a custom user agent to send request at the server, we can use the -a
or --user-agent flag. By default, the user agent used by Feroxbuster is
feroxbuster/<version>.
There are times when we need to skip certain status codes responses, so we can
use the -C or --filter-status, to skip the results of the mentioned codes. If we
want to include a particular status code in output, we can use the -s or --status-
codes flag.
To present the output without showing the progress bar or banner, we can use
the quite mode by giving the -q or --quiet flag.
feroxbuster -u http://192.168.1.4 -q
Controlling threads
feroxbuster -u http://192.168.1.4 -t 20
Custom wordlist
To use a custom wordlist, we can use the -w or --wordlist flag and then give the
wordlist path. Here we are giving the common.txt file path.
Disable recursion
To allow the scanning of only top level directories, we can set the -n or --no-
recursion flag to disable the recursive scanning.
feroxbuster -u http://192.168.1.4 -n
Limit recursion depth
feroxbuster -u http://192.168.1.4 -L 4
Force Recursion
To ensure that the recursion is used, we can use the --force-recursion flag.
To filter out the messages of a particular length, we can use the -S or --filter-size
flag. This will filter based on character size.
feroxbuster -u http://192.168.1.4 -q
feroxbuster -u http://192.168.1.4 -q -S 285,286,283,289
Filter by number of words
To filter out the results using number of words filter, we can use the -w or --
filter-words flag.
feroxbuster -u http://192.168.1.4 -q
feroxbuster -u http://192.168.1.4 -q -W 33
Filter by number of lines
To filter out the results using number of words filter, we can use the -N or --
filter-lines flag.
feroxbuster -u http://192.168.1.4 -q
feroxbuster -u http://192.168.1.4 -q -N 9
Filter by status code using deny list
To filter the results using status codes (deny list), we can use the --filter-status
flag.
feroxbuster -u http://192.168.1.4 -q
feroxbuster -u http://192.168.1.4 -q --filter-status 404
Filter by status code using allow list
To filter the results using status codes (allow list), we can use the --status-codes
flag.
feroxbuster -u http://192.168.1.4 -q
feroxbuster -u http://192.168.1.4 -q --status-codes 200,301
Generating random User-Agent
To use a random user agent for every request, we can use the -A flag. Here we
have used the --burp flag simultaneously to show how the user agent looks in
the requests.
To explicitly define the HTTP methods to be used, we can use the -m flag and
then state the method to be used like POST. The default method is GET while
running the Feroxbuster.
To explicitly define the request header to be used, we can use the -H flag and
then state the header alongwith the value to be used like 'Content-Type:
application/x-www-form-urlencoded'. Here we have used the --burp flag
simultaneously to show how the user agent looks in the requests.
Cookies
To use a specific cookie value in all the requests, we can mention the cookies
header alongwith the value. The flag which can be used here is --cookies or -b.
Here we have used the --burp flag simultaneously to show how the cookie looks
in the requests.
To add a slash (/) after every request, we can use the -f or --add-slash flag.
feroxbuster -u http://192.168.1.4 -f
Capturing requests in Burp
To capture a request in Burp Suite, we can use the --burp flag while running the
scan.
To perform the scanning on the targets provided in the list, we can use the
following command:
cat target.txt
cat target.txt| feroxbuster --stdin -q
Resume from last state
If we wish to resume the scan from the last state, we can use the --resume-from
flag and provide the .state file. There are times when we need to terminate the
scan in between, so Feroxbuster will save the results in the file.
feroxbuster -u http://192.168.1.4 -q
feroxbuster --resume-from ferox-http_192_168_1_4-1723370176.state -q
Follow redirect
While scanning if there are requests which result in the redirection, so we can
control that by allowing the clients to follow the redirects using -r flag.
feroxbuster -u http://192.168.1.4 -r
Timeout
To setup a timeout limit, we can use the -T flag. This determines the amount of
time the Feroxbuster wil wait for the server response before terminating the
scan. By default, this value is set to 7 seconds, however we can modify it by using
the flag.
feroxbuster -u http://192.168.1.4
The above image shows the default timeout limit used and now we are going to
modify it to 5 seconds.
feroxbuster -u http://192.168.1.4 -T 5
Comparasion between Feroxbuster and other tools
Conclusion
Network Pentest
Wireless Pentest
ADVANCED
Advanced CTF
Android Pentest Metasploit
EXPERT
Privilege Escalation
APT’s - MITRE Attack Tactics
Windows
Active Directory Attack
Linux
MSSQL Security Assessment
www.ignitetechnologies.in