Rustbuster is a high-performance web fuzzer and content discovery tool designed to enumerate directories, DNS entries, virtual hosts, and perform custom fuzzing for web security assessments.
A Comprehensive Web Fuzzer and Content Discovery Tool
Rustbuster is primarily used by security professionals and penetration testers to discover hidden web content, directories, subdomains, and virtual hosts, as well as to perform custom fuzzing on web applications. It helps identify potential attack surfaces and vulnerabilities by automating the enumeration and fuzzing processes across various web security domains.
Rustbuster requires valid wordlists for effective enumeration and fuzzing; users should ensure they have permission to test target systems to avoid legal issues. The tool supports ignoring TLS certificate validation, which is useful for testing internal or self-signed environments. Proper handling of CSRF tokens is supported for fuzzing authenticated endpoints.
Fetch the latest release version from the GitHub releases page using curl and grep
Create the directory /opt/rustbuster if it doesn't exist
Download the prebuilt binary for the latest version to /opt/rustbuster using wget
Create a symbolic link named rustbuster pointing to the downloaded binary
Make the binary executable with chmod +x
Run /opt/rustbuster/rustbuster -h to verify installationrustbuster dir -u http://localhost:3000/ -w examples/wordlist -e php
Enumerates directories and files on the specified URL using the provided wordlist and file extension filter.
rustbuster dns -d google.com -w examples/wordlist
Performs DNS A/AAAA record enumeration for the specified domain using the provided wordlist.
rustbuster vhost -u http://localhost:3000/ -w examples/wordlist -d test.local -x "Hello"
Enumerates virtual hosts on the target URL using the wordlist and domain filter, looking for the specified response string.
rustbuster fuzz -u http://localhost:3000/login -X POST -H "Content-Type: application/json" -b '{"user":"FUZZ","password":"FUZZ","csrf":"CSRFCSRF"}' -w examples/wordlist -w /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-10000.txt -s 200 --csrf-url "http://localhost:3000/csrf" --csrf-regex '\{"csrf":"(\w+)"\}'
Performs custom fuzzing on the login endpoint using POST requests with JSON bodies, multiple wordlists, and CSRF token handling.
rustbuster tilde -u http://localhost:3000/ -e aspx -X OPTIONS
Enumerates IIS 8.3 shortnames (tilde files) on the target URL using the specified file extension and HTTP method.