0% found this document useful (0 votes)
122 views7 pages

Gobuster Scan

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views7 pages

Gobuster Scan

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

GOBUSTER SCAN

PROJECT SYNOPSIS

OF

SIX WEEKS INSDUSTRIAL TRANNING

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

SUBMITTED BY

FRANK AMAN YADAV 22-B-CSE-023

SCHOOL OF ENGINEERING

RIMT UNIVERSITY, MANDIGOBINDGARH PUNJAB

JULY 2024
Abstract

Gobuster is a powerful and versatile open-source tool widely utilized in cybersecurity and penetration
testing for the purpose of resource enumeration and vulnerability discovery. It is designed to identify
hidden directories, files, subdomains, and virtual hosts on web servers by performing brute-forcing
techniques using customizable wordlists. Gobuster’s core functionality revolves around generating a
high volume of HTTP requests based on a user-specified wordlist and analyzing the responses to
uncover resources that are not readily accessible or indexed, such as sensitive files,
misconfigurations, or restricted directories.One of Gobuster's key features is its support for various
modes, including directory brute-forcing, DNS subdomain enumeration, and virtual host discovery,
enabling security professionals to uncover potential attack surfaces effectively. By identifying these
hidden resources, Gobuster aids in assessing the security posture of web applications and helps
organizations address potential vulnerabilities proactively. Its high-speed performance, simplicity,
and compatibility with large datasets make it a preferred choice for penetration testers who require
reliable and efficient tools for reconnaissance and enumeration tasks.In the context of modern web
security, Gobuster plays a critical role in identifying overlooked entry points and supporting the
mitigation of risks. This expanded abstract highlights its importance in the arsenal of ethical hackers,
security researchers, and IT professionals aiming to strengthen the defenses of their digital
infrastructures.

ii
acknowledgement

iii
About company and institution

iv
CANDIDATE’S DECLARATION

I hereby certify that the project entitled “GOBUSTER SCAN” submitted by FRANK AMAN
YADAV & 22-B-CSE-023 in partial fulfilment of the requirement for the award of degree of B.
Tech. (Computer Science and Engineering) submitted in Department of Computer Science and
Engineering, at RIMT University, Mandi-Gobindgarh is an authentic record of my own work carried
out during a period from 6th June 2024 to 20th July 2024. The matter presented in this project has
not formed the basis for the award of any other degree, diploma, fellowship, or any other similar
titles.

Signature of the Student


Pace:
Date:

The Industrial Training Viva-Voice Examination of __________________________ has been held


on__________________________ and accepted.

Signature of Internal Examiner Signature of External Examiner

v
CERTIFICATE

This is to certify that the project titled “GOBUSTER SCAN” is the bona fide work carried out by
Frank aman yadav & 22-B-CES-023 in partial fulfilment of the requirement for the award of the B.
Tech (Computer Science and Engineering) submitted in Department of Computer Science and
Engineering, at RIMT University, Mandi-Gobindgarh is an authentic record of my own work carried
out during a period from 6th June 2024 to 20th July 2024 Under the guidance of Prof.
________________________. The Minor Project Viva Voice Examination has been held on
_________________.

Signature of Guide Signature of the HOD


Department of Computer Science & Engineering

vi
TABLE OF CONTENT

TOPICS Page
no.
1 Introduction
. 1.1 Background
1.2 Problem statement
1.3 Objectives of the project
1.4 Scope
1.5 Key concepts and terminologies
1.6 Importance of automation in Penetration testing

2 Literature Survey
. 2.1 Existing tools and Technologies
2.2 Gobuster Automation in practice
2.3 Challenges in Gobuster automation

3 Methodology
. 3.1 Steps for project development

4 Facilities Required
. 4.1 Software requirements
4.2 Hardwares requirements
4.3 Additional resources

5 conclusion
.
6 references
.

You might also like