Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Introduction to Wordlists

Premium room

Learn to build targeted wordlists using OSINT and apply them in penetration testing.

easy

60 min

36

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

This room will guide you through the fundamentals of using, building, and refining wordlists for ethical hacking and penetration testing. Wordlists are powerful text files containing potential usernames, passwords, and directory names, and are essential tools for password cracking, directory enumeration, and other automated testing tasks.

Learning Objectives

  • Learn what wordlists are and where they're used in offensive security.
  • Discover how to gather company-specific terms and usernames using open-source intelligence () techniques.
  • Create, clean, and deduplicate custom wordlists.
  • Use your refined lists with tools like ffuf to uncover hidden web directories and to brute-force login pages.

Prerequisites

Before starting this room, you should be comfortable with:

  • Basic command-line navigation (lscat, grepsort)
  • Making HTTP requests from the terminal (curl, wget)
  • Basic web concepts: status codes and how login forms work

Follow each task in order and read the explanations carefully. By the end of this room, you'll have a solid foundation for building targeted wordlists and using them effectively during engagements.

Answer the questions below
I’m ready to learn about wordlists!

Ready to learn Cyber Security?

The Introduction to Wordlists room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.