Type your comment> @pgpg said:
I am struggling to exploit the web direcotry of machine Sense and find that it has a rather low speed regardless of what tools I used for this exploit, I tried dirb, dirbuster, gobuster, dirsearch. Is there any way to improve the efficiency for it?
root@pentest:~# gobuster dir -k -u https://10.10.10.60/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x txt,cnf,conf =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: https://10.10.10.60/ [+] Threads: 10 [+] Wordlist: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Extensions: cnf,conf,txt [+] Timeout: 10s =============================================================== 2020/07/21 03:23:35 Starting gobuster =============================================================== /themes (Status: 301) /css (Status: 301) /includes (Status: 301) /javascript (Status: 301) /changelog.txt (Status: 200) /classes (Status: 301) /widgets (Status: 301) /tree (Status: 301) /shortcuts (Status: 301) /installer (Status: 301) /wizards (Status: 301)
I have ran gobuster for this exploit for more than 30mins, it didn’t dig out the files I want, ANY ideas?
You could always increase the threads from 10 (default) to 100 ‘gobuster -t 100’