Forrest logo
back to the gobuster tool

gobuster:tldr:b2cdf

gobuster: Discover subdomains.
$ gobuster dns --domain ${example-com} --wordlist ${filename}
try on your machine

The command "gobuster dns --domain ${example-com} --wordlist ${filename}" is used to perform a DNS subdomain brute-forcing attack using the tool called "gobuster." Below is the breakdown of the different components of the command:

  1. "gobuster": Refers to the name of the tool being used. Gobuster is a popular tool for performing directory and DNS subdomain brute-forcing.

  2. "dns": Specifies the mode of operation for gobuster, indicating that we want to perform a DNS subdomain brute-forcing attack.

  3. "--domain ${example-com}": Specifies the target domain on which the brute-forcing attack will be performed. The placeholder "${example-com}" should be replaced with the actual domain name you want to target. The domain name should not include "https://" or "www" prefixes.

  4. "--wordlist ${filename}": Specifies the wordlist to be used for the brute-forcing attack. The placeholder "${filename}" should be replaced with the path and name of the wordlist file containing a list of subdomains to be tested. The wordlist typically contains a large number of common subdomains, allowing the tool to guess and discover valid subdomains.

By running this command, gobuster will perform a DNS subdomain brute-forcing attack, trying out different subdomains from the provided wordlist against the specified domain. The tool will query the DNS server for each subdomain combination and check if it resolves to a valid IP address. If a DNS response is received, it indicates the existence of a valid subdomain.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the gobuster tool