Skip to content

Module 06 · Dir & File Enumeration

Flag: --skip-dirbrute

Combines wordlist-based directory brute-forcing with targeted probing of 40+ known sensitive paths.


Directory brute-force

Mode Wordlist used
Normal --wl-dirs-small (default: dirb/common.txt)
Aggressive --wl-dirs-big (default: dirbuster/directory-list-2.3-medium.txt)

Tool priority: gobuster → ffuf → dirb

# Use a custom wordlist
./websec-audit.sh -t https://target.com --wl-dirs-small /path/to/custom.txt

Sensitive path probing

40+ paths are probed directly with curl regardless of the brute-force wordlist. Findings are severity-classified automatically:

Path Why
/.git/HEAD Git repository exposed
/.git/config Git config exposed
/.env Environment file with credentials
/.env.local Local environment file
/.env.production Production secrets
/wp-config.php WordPress database credentials
/wp-config.php.bak Backup of WP config
/configuration.php Joomla config
/config/database.yml Rails DB config
/.aws/credentials AWS credentials file
/db.sql, /dump.sql, /backup.sql Database dumps
Path Why
/phpinfo.php, /info.php PHP environment disclosure
/phpmyadmin/, /adminer.php Database admin interfaces
/web.config IIS config / credentials
/backup.zip, /backup.tar.gz Backup archives
/console Interactive console (RCE risk)
/Dockerfile, /docker-compose.yml Infrastructure secrets
Path Why
/admin/, /administrator/ Admin panels
/.htaccess Apache config
/server-status, /server-info Apache status pages
/_profiler/, /_debugbar Framework debug panels
/graphiql GraphQL IDE
/.DS_Store Directory structure leak
/package.json, /composer.json Dependency exposure
Path Why
/robots.txt May disclose hidden paths
/sitemap.xml Site structure
/api/swagger.json, /swagger-ui.html API docs
/graphql GraphQL endpoint
/.well-known/security.txt Security contact policy

Output files

dirs/
├── gobuster_dirs.txt
├── gobuster_dns.txt
├── ffuf_results.json
├── dirb_results.txt
└── sensitive_paths_found.txt   # only paths that returned 200/301/302