Skip to content

rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments

License

Notifications You must be signed in to change notification settings

C-Sto/recursebuster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RecurseBuster

Go Basic Checks

screengrab of tool running

It's like gobuster, but recursive!

I wanted a recursive directory brute forcer that was fast, and had certain features (like header blacklisting, and recursion). It didn't exist, so I started writing this. In reality, I'll probably merge a lot of the functionality into github.com/swarley7/gograbber since that solves a similar problem and has cool features that I don't want to implement (phantomjs, ugh). For now, it will do.

Installation

Ye olde go get install should work. Same command to update:

go get -u github.com/c-sto/recursebuster 

Important releases will also be tagged and uploaded.

NOTE Since tagged releases have started, some old versions which have been obtained with go get -u seem to be broken. Removing the folder and starting again seems to work:

rm -rf $GOPATH/src/github.com/c-sto/recursebuster rm $GOPATH/bin/recursebuster go get -u github.com/c-sto/recursebuster 

Usage

I wanted it to be fairly straightforward, but scope creep etc. Basic usage is just like gobuster:

recursebuster -u https://google.com -w wordlist.txt 

This will run a recursive-HEAD-spider-assisted search with a single thread on google.com using the wordlist specified above. Results will print to screen, but more importantly, will be written to a file 'busted.txt'.

Features

HEAD Based Checks

For servers the support it, HEAD based checks speed up content discovery considerably, since no body is required to be transferred. The default logic is to use a HEAD request to determine if something exists. If it seems to exist, a GET is sent to retrieve and verify. If there are sensitive pages that perform actions (AKA, ones that don't really follow the HTTP Verb Spec), a file containing a list of exact URLS that should not requested can be blacklisted with the -blacklist flag.

Recursion

When a directory is identified, it gets added to the queue to be brute-forced. By default, one directory is brute-forced at a time, however you can 'cancel' a directory interactively by hitting 'ctrl+x' if in UI mode. If you're not in UI mode (-noui), you need to have added the directory to the blacklist.

Spider Assistance

Since we are getting the page content anyway, why not use it to our advantage? Some basic checks are done to look for links within the HTML response. The links are added, and any directories identified added too. By default, only the supplied host is whitelisted, so any links that go off-site (rather, to a different domain) are ignored. You can specify a file that contains a list of whitelisted domains that you are OK with including into the spider with the -whitelist flag.

Speed

Gobuster is pretty fast when you smash -t 200, but who would do that? One of my goals for this was to keep performance on-par with gobuster where possible. On most webservers, recursebuster seems to be faster, even though it sends both a HEAD and a GET request. This means you will hit WAF limits really quickly, and is why by default it's -t 1.

Proxy options

The ability to use a proxy is fairly useful in several situations. Not having to drop tools on a host in order to scan through it is always useful - recursebuster also works through burp if you specify it as a http proxy. When using Recursebuster to supplement the burp sitemap - use the -stitemap option to send only the 'found' or interesting responses to burp, this should help avoid filling up your HTTP History with 404's.

Usage args

Idk why you might want these, just run it with -h 2>&1 and grep for the keyword. Here they are anyway:

 -ajax Add the X-Requested-With: XMLHttpRequest header to all requests -all Show, and write the result of all checks -appendslash Append a / to all directory bruteforce requests (like extension, but slash instead of .yourthing) -auth string Basic auth. Supply this with the base64 encoded portion to be placed after the word 'Basic' in the Authorization header. -bad string Responses to consider 'bad' or 'not found'. Comma-separated. This works the opposite way of gobuster! (default "404") -badheader value Check for presence of this header. If an exact match is found, the response is considered bad.Supply as key:value. Can specify multiple - eg '-badheader Location:cats -badheader X-ATT-DeviceId:XXXXX' -blacklist string Blacklist of prefixes to not check. Will not check on exact matches. -canary string Custom value to use to check for wildcards -clean Output clean URLs to the output file for easy loading into other tools and whatnot. -cookies string Any cookies to include with requests. This is smashed into the cookies header, so copy straight from burp I guess. -debug Enable debugging -ext string Extensions to append to checks. Multiple extensions can be specified, comma separate them. -headers value Additional headers to include with request. Supply as key:value. Can specify multiple - eg '-headers X-Forwarded-For:127.0.01 -headers X-ATT-DeviceId:XXXXX' -https Use HTTPS instead of HTTP. -iL string File to use as an input list of URL's to start from -k Ignore SSL check -len Show, and write the length of the response -methods string Methods to use for checks. Multiple methods can be specified, comma separate them. Requests will be sent with an empty body (unless body is specified) (default "GET") -nobase Don't perform a request to the base URL -noget Do not perform a GET request (only use HEAD request/response) -nohead Don't optimize GET requests with a HEAD (only send the GET) -norecursion Disable recursion, just work on the specified directory. Also disables spider function. -nospider Don't search the page body for links, and directories to add to the spider queue. -nostartstop Don't show start/stop info messages -nostatus Don't print status info (for if it messes with the terminal) -noui Don't use sexy ui -nowildcard Don't perform wildcard checks for soft 404 detection -o string Local file to dump into (default "./busted.txt") -proxy string Proxy configuration options in the form ip:port eg: 127.0.0.1:9050. Note! If you want this to work with burp/use it with a HTTP proxy, specify as http://ip:port -ratio float Similarity ratio to the 404 canary page. (default 0.95) -redirect Follow redirects -sitemap Send 'good' requests to the configured proxy. Requires the proxy flag to be set. ***NOTE: with this option, the proxy is ONLY used for good requests - all other requests go out as normal!*** -t int Number of concurrent threads (default 1) -timeout int Timeout (seconds) for HTTP/TCP connections (default 20) -u string Url to spider -ua string User agent to use when sending requests. (default "RecurseBuster/1.5.11") -v int Verbosity level for output messages. -version Show version number and exit -w string Wordlist to use for bruteforce. Blank for spider only -whitelist string Whitelist of domains to include in brute-force 

Credits:

OJ/TheColonial: Hack the planet!!!!

Swarley: Hack the planet!!!!!

Hackers: Hack the planet!!!!

About

rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages