TARGET INPUT

To use gbounty to scan a website, you would first need to specify the target URL of the website you want to scan using the -u or --url flag. For example, if you wanted to scan the website at https://example.com, you would use the following command:

gbounty -u https://example.com

This would scan the https://example.com website using the default settings for gbounty. For example, to scan the https://example.com and https://example.com/redirect.php?url=/ URLs, you would use the -u flag like this:

gbounty -u https://example.com -u https://example.com/redirect.php?url=/

Alternatively, you can specify a file containing a list of URLs to scan, with one URL per line, using the -uf or --urls-file flag. For example, if you had a file named urls.txt that contained the following lines:

www.example.com
www.example.com/test.php?id=2783
www.example.com/login.php?redirect=/
www.example.com/submit.php?user=test&password=test www.example.org
www.example.org/test.php?account_id=34
www.example.org/login.php?redirect_uri=/
www.example.org/submit.php?search=test

You could use the -uf flag to tell gbounty to use the URLs contained in the urls.txt file as the targets for its scans.

gbounty -uf /path/to/urls.txt

You can use the --raw-request flag with gbounty to specify one or more raw request templates that gbounty should use when conducting its scans. The --raw-request flag can be used multiple times to specify multiple request templates.

Here is an example of how the -rr flag might be used:

gbounty --raw-request /path/requests/req1.txt --raw-request /path/requests/req2.txt

The format of the raw request req1.txt could be something like this (first line the host with protocol, for example https://example.com or http://example.com):

https://example.com
POST /search.php HTTP/1.1
Host: example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 24
Connection: close

search=test&goButton=go

The -rf or --requests-file flag can be used to specify a file containing a list of raw request that gbounty should use when conducting its scans. This flag allows users to specify a specific file containing the raw request that gbounty should use, rather than specifying the raw request files directly on the command line. The file that is specified with the -rf flag must be a zipped file containing one raw request per file. This allows users to organize their raw request into multiple files and then easily specify all of the raw requests at once using the -rf flag.

Here is an example of how the -rf flag might be used:

gbounty -rf requests.zip

This command would tell gbounty to use the raw request contained in the requests.zip file when conducting its scans.

By default, gbounty does not scan any URLs or use any request templates unless the -u, -uf, -rf, or -rr flags are used to specify the target URL(s) and request templates.

You can then use additional flags to customize the behavior of the tool, such as specifying the profiles to use, the HTTP method to use for requests, and so on.

Options for –url (-u) and –urls-file (-uf):

  • -X or --method: This flag allows you to specify a default HTTP method that gbounty should use when conducting its scans. The HTTP method specifies the type of action that the request is intended to perform, such as GET, POST, PUT, or DELETE. For example, you could use the -X flag like this: gbounty -X POST -u https://example.com. This would tell gbounty to use the POST method as the default HTTP method for its scans (overriding the default method of the request and profiles.).

  • -H or --header: This flag allows you to specify default HTTP headers that gbounty should use when conducting its scans. HTTP headers are used to provide additional information about the request, such as the content type, encoding, or authentication credentials. The -H flag can be used multiple times to specify multiple default headers. For example, you could use the -H flag like this: gbounty -H "Accept: application/json" -H "Content-Type: application/json". This would tell gbounty to use the Accept and Content-Type headers with the specified values as the default headers for its scans.

  • -d or --data: This flag allows you to specify a default HTTP body data that gbounty should use when conducting its scans. The HTTP body data is the data that is sent along with the request, and it can be used to provide additional information or parameters for the request. For example, you could use the -d flag like this: gbounty -d "{\"username\":\"admin\",\"password\":\"password123\"}". This would tell gbounty to use the specified data as the default HTTP body data for its scans.

Last updated