This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP/Training/OWASP DirBuster Project"
From OWASP
| Line 3: | Line 3: | ||
| Module_Overview_Goal = | | Module_Overview_Goal = | ||
DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these. | DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these. | ||
| + | <br> | ||
| + | The goal of this project is to produce a tool which will assist in black box application testing, by trying to find hidden content. The project ensures that the tool produced provides information in such a way that any false positives produce can be quickly identified. | ||
| + | |||
| Content = | | Content = | ||
Revision as of 23:54, 1 May 2010
| MODULE | |
| OWASP DirBuster Project | |
| Overview & Goal | |
| DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these.
| |
| Contents | Materials |
* Content_X
|
[http:// TBD] |