<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Brute-Force on slightlymore</title><link>https://slightlymore.co.uk/tags/brute-force/</link><description>Recent content in Brute-Force on slightlymore</description><generator>Hugo</generator><language>en-GB</language><copyright>&lt;a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="license"&gt;CC BY 4.0&lt;/a&gt; by Clinton Montague</copyright><lastBuildDate>Wed, 25 Mar 2026 11:04:09 +0000</lastBuildDate><atom:link href="https://slightlymore.co.uk/tags/brute-force/index.xml" rel="self" type="application/rss+xml"/><item><title>Brute forcing subdomain enumeration</title><link>https://slightlymore.co.uk/brute-forcing-subdomain-enumeration/</link><pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate><guid>https://slightlymore.co.uk/brute-forcing-subdomain-enumeration/</guid><description>&lt;h2 id="dnsenum"&gt;&lt;code&gt;dnsenum&lt;/code&gt;&lt;/h2&gt;
&lt;p&gt;Performs various dns-level and osint searches to find sub domains.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;dnsenum &lt;span class="se"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; --enum target.tld &lt;span class="se"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; -f /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="gobuster"&gt;&lt;code&gt;gobuster&lt;/code&gt;&lt;/h2&gt;
&lt;p&gt;You can do virtual host subdomain brute forcing with gobuster. You can specify the target as a hostname or ip.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-shell" data-lang="shell"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;gobuster vhost &lt;span class="se"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; -u http&lt;span class="o"&gt;[&lt;/span&gt;s&lt;span class="o"&gt;]&lt;/span&gt;://targetip&lt;span class="o"&gt;[&lt;/span&gt;:port&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="se"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt &lt;span class="se"&gt;\
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; --append-domain
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>Installing seclists on Kali</title><link>https://slightlymore.co.uk/installing-seclists-on-kali/</link><pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate><guid>https://slightlymore.co.uk/installing-seclists-on-kali/</guid><description>&lt;p&gt;The seclists from &lt;a href="https://github.com/danielmiessler/SecLists" target="_blank" rel="noopener"&gt;https://github.com/danielmiessler/SecLists ↗️&lt;/a&gt;
 can be installed on Kali using apt&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;apt install seclists
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;They&amp;rsquo;re installed into &lt;code&gt;/usr/share/seclists/&lt;/code&gt;&lt;/p&gt;</description></item></channel></rss>