J3bitokjebitok.hashnode.dev·Nov 3, 2024Offensive Security Tooling: Gobuster: The Basics (TryHackMe)In this article, I will write a Gobuster: The Basics that covers Environment and Setup, Gobuster: Introduction, Use Case: Directory and File Enumeration, Use Case: Subdomain Enumeration, and Use Case: Vhost Enumeration. What flag to we use to specif...Discussgobuster
Mahak Pandeymahakpandeyofficial.hashnode.dev·Jul 4, 2024Step-by-Step Guide to Finding Hidden Paths and Subdomains with GobusterIntroduction In the world of cybersecurity, visibility is key. Many potential vulnerabilities lie hidden behind unadvertised directories, files, or subdomains. Uncovering these hidden elements is crucial for a thorough security assessment. Enter Gobu...Discuss·11 likesgobuster
saurabh sharma.blog.esskayesss.dev·Mar 29, 2023E1: Intro to Offensive Securityintroduction and a foreword. This room provides an opportunity for you to get hands-on experience of breaking a hypothetical banking system, by gaining access to a critical page that was public by design, but not indexed anywhere on the website. Addi...Discuss·2 likes·174 readstryhackme.tryhackme