Day 36 – Directory Bruteforce | Complete Beginner Guide
📂 Day 36: Directory Bruteforce
Bug hunting me kai baar vulnerabilities hidden directories me milti hain.
Website ka jo part user ko dikhta hai, wo sirf surface hota hai.
Real interesting cheezein aksar hidden folders me hoti hain 🔥
Is process ko kehte hain:
Directory Bruteforce (ya Directory Enumeration)
🧠 Directory Bruteforce Kya Hota Hai?
Directory Bruteforce ka matlab hai:
✔ Website ke hidden folders aur files ko identify karna
✔ Guess karna ki kaun se common paths exist kar sakte hain
✔ Unko check karna ki accessible hain ya nahi
Example website:
example.com
Possible hidden paths:
example.com/admin
example.com/login
example.com/backup
example.com/dev
example.com/config
Agar ye public accessible ho gaye → vulnerability mil sakti hai.
🎯 Ye Important Kyu Hai?
Developers kabhi-kabhi:
Test folders delete nahi karte
Backup files server par chhod dete hain
Old admin panels remove nahi karte
Ye sab hidden entry points ban jate hain.
🔍 Directory Bruteforce Ka Concept
Is technique me:
Ek wordlist use hoti hai (common folder names ki list)
Tool ya manual method se check kiya jata hai
Server response observe kiya jata hai
Response types:
200 OK → Folder exist karta hai
403 Forbidden → Exist karta hai but restricted
404 Not Found → Exist nahi karta
Yahi se hidden paths milte hain.
🛠 Common Targets
Bug hunters commonly search karte hain:
✔ /admin
✔ /dashboard
✔ /backup
✔ /test
✔ /old
✔ /staging
✔ /api
✔ /config
Kabhi-kabhi:
✔ .zip files
✔ .bak files
✔ .sql backup files
Publicly accessible mil jate hain.
🌐 Real-World Thinking
Maan lo aap kisi company ka program test kar rahe ho.
Example large tech companies jaise:
Google
Facebook
Inke thousands endpoints hote hain.
Agar kisi subdomain me:
/dev
folder accidentally public ho jaye, to waha sensitive information mil sakti hai.
🧩 Directory Bruteforce Ke Baad Kya Kare?
Agar koi folder milta hai:
Uska content analyze karo
Login required hai ya nahi check karo
Sensitive files exposed hain ya nahi dekho
Access control test karo
⚠ Legal Warning
Directory Bruteforce sirf:
✔ Authorized bug bounty program me
✔ Apni lab environment me
✔ Legal permission ke sath
Karein.
Unauthorized scanning illegal ho sakta hai.
🧠 Beginner Mistakes
❌ Sirf homepage test karna
❌ Response codes ignore karna
❌ 403 ko ignore kar dena (kabhi-kabhi interesting hota hai)
❌ Documentation maintain na karna
🔥 Pro Tip
Har discovered path ko document karo:
URL
Status code
Response size
Interesting keywords
Professional bug hunters structured notes maintain karte hain.
🔁 Revision Points
Directory Bruteforce = Hidden folders find karna
Wordlist based guessing hota hai
200, 403, 404 responses important hote hain
Dev/test/backup folders common weak points hain
Legal permission mandatory hai