dirb
web directory brute-force scanner
TLDR
SYNOPSIS
dirb url [wordlistfile] [options_]
DESCRIPTION
dirb is a web content scanner that discovers existing and hidden web objects by launching dictionary-based attacks against a web server and analyzing the responses.
It is commonly used in penetration testing to find unlinked content, backup files, configuration files, and administrative interfaces. DIRB ships with several built-in wordlists located in `/usr/share/dirb/wordlists/`.
PARAMETERS
-a agent
Custom User-Agent string.-b
Don't squash or merge sequences of /../ or /./ in the given URL.-c cookie
Set a cookie for HTTP requests.-E certfile
Use the specified client certificate file.-f
Fine-tune NOT_FOUND (404) detection.-H header
Add a custom header to the HTTP request.-i
Use case-insensitive search.-l
Print "Location" header when found.-N code
Ignore responses with this HTTP code.-o file
Save output to disk.-p proxy[:port]
Use this proxy (default port: 1080).-P user:pass
Proxy authentication.-r
Don't search recursively.-R
Interactive recursion (ask which directories to scan).-S
Silent mode (don't show tested words).-t
Don't force an ending '/' on URLs.-u user:pass
HTTP authentication username and password.-v
Show also non-existent pages.-w
Don't stop on WARNING messages.-x extfile
Amplify search with extensions from this file.-X extensions
Amplify search with these extensions (e.g., ".php,.html").-z ms
Add delay in milliseconds between requests.
CAVEATS
Use only against authorized targets. Unauthorized scanning may be illegal. Use `-z` for rate limiting to avoid detection or causing denial of service. Default wordlists may not cover all cases; custom wordlists improve results.
HISTORY
dirb was written by The Dark Raver and has been part of the Kali Linux security distribution. It is one of the original web content brute-forcing tools, predating modern alternatives like gobuster and feroxbuster.
