Closed Anon-Exploiter closed 4 years ago
Also, in case the pull request gets accepted, also edit the readme file of the repository, with updated output because why not? ¯\(ツ)/¯
Preferably run against metasploitable(2/3) because it'll show many things about Reconnoitre!
I'll need to review the new student VM but this has intentionally been held back previously as the offsec VM didn't yet support gobuster 2.x (which has this functionality change). I'll review soon and then merge if appropriate.
Closing this for now. This change will be made once the student VM supports gobuster 2.x as a default.
Sure, ^ just FYI, I don't think so everyone uses it for OSCP only, I myself utilize this and nmapAutomator in various client engagements. I'd suggest keeping separate branches for both :)
@Anon-Exploiter although I can appreciate that, I think moving to something like https://github.com/codingo/Interlace makes more sense in a professional setting. I work as a pentester myself (and an active bug bounty hunter) and don't think any of these group scanners are appropriate for that work.
The latest version of gobuster won't work without specifying dir before performing directory brute-forcing. Added
dir
in it.Before:
gobuster -w dict.txt -u http://$ip:$port/ -s '200,204,301,302,307,403,500' -e
After:
gobuster dir -w dict.txt -u http://$ip:$port/ -s '200,204,301,307,403,500' -e