DIRB is a Web Content Scanner AKA a domain brute-forcing tool. It looks for existing (and/or hidden) Web Objects, it works by launching a dictionary based attack against a web server and analysing the responses.
What is DIRB?
DIRB comes with a set of preconfigured attack word-lists for easy usage but you can use your custom word-lists. Also it can sometimes can be used as a classic CGI scanner, but do remember this is a content scanner not a vulnerability scanner.
There are other tools with similar functionalities such as:
– Patator – Multi-threaded Service & URL Brute Forcing Tool
– dirs3arch – HTTP File & Directory Brute Forcing Tool
– DirBuster – Brute Force Directories & Files Names
And tools that can accomplish the same or similar things like:
– Wfuzz v1.4 Released for Download – Bruteforcing & Fuzzing Web Applications
DIRB Usage For Domain Brute-forcing
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 |
dirb ----------------- DIRB v2.21 By The Dark Raver ----------------- ./dirb <url_base> [<wordlist_file(s)>] [options] ========================= NOTES ========================= <url_base> : Base URL to scan. (Use -resume for session resuming) <wordlist_file(s)> : List of wordfiles. (wordfile1,wordfile2,wordfile3...) ======================== HOTKEYS ======================== 'n' -> Go to next directory. 'q' -> Stop scan. (Saving state for resume) 'r' -> Remaining scan stats. ======================== OPTIONS ======================== -a <agent_string> : Specify your custom USER_AGENT. -c <cookie_string> : Set a cookie for the HTTP request. -f : Fine tunning of NOT_FOUND (404) detection. -H <header_string> : Add a custom header to the HTTP request. -i : Use case-insensitive search. -l : Print "Location" header when found. -N <nf_code>: Ignore responses with this HTTP code. -o <output_file> : Save output to disk. -p <proxy[:port]> : Use this proxy. (Default port is 1080) -P <proxy_username:proxy_password> : Proxy Authentication. -r : Don't search recursively. -R : Interactive recursion. (Asks for each directory) -S : Silent Mode. Don't show tested words. (For dumb terminals) -t : Don't force an ending '/' on URLs. -u <username:password> : HTTP Authentication. -v : Show also NOT_FOUND pages. -w : Don't stop on WARNING messages. -X <extensions> / -x <exts_file> : Append each word with this extensions. -z <milisecs> : Add a miliseconds delay to not cause excessive Flood. ======================== EXAMPLES ======================= ./dirb http://url/directory/ (Simple Test) ./dirb http://url/ -X .html (Test files with '.html' extension) ./dirb http://url/ /usr/share/dirb/wordlists/vulns/apache.txt (Test with apache.txt wordlist) ./dirb https://secure_url/ (Simple Test with SSL) |
You can download DIRB the domain brute force tool here:
Or read more here.
a_servant says
And the difference with DirBuster would be… ?
Darknet says
There are lots of tools with similar functionalities (port scanners, vuln scanners, dir scanners etc etc etc), I’m here to provide options. If you want to start a blog comparing similar tools, please go ahead and let me know – I’d be interested to read it :)
droppin dimeZ says
it’s the same tool…DirBuster is the gui version