To access material, start machines and answer questions login.
This room will guide you through the fundamentals of using, building, and refining wordlists for ethical hacking and penetration testing. Wordlists are powerful text files containing potential usernames, passwords, and directory names, and are essential tools for password cracking, directory enumeration, and other automated testing tasks.
Learning Objectives
- Learn what wordlists are and where they're used in offensive security.
- Discover how to gather company-specific terms and usernames using open-source intelligence () techniques.
- Create, clean, and deduplicate custom wordlists.
- Use your refined lists with tools like ffuf to uncover hidden web directories and to brute-force login pages.
Prerequisites
Before starting this room, you should be comfortable with:
- Basic command-line navigation (
ls,cat,grep,sort) - Making HTTP requests from the terminal (
curl,wget) - Basic web concepts: status codes and how login forms work
Follow each task in order and read the explanations carefully. By the end of this room, you'll have a solid foundation for building targeted wordlists and using them effectively during engagements.
Ready to learn Cyber Security?
The Introduction to Wordlists room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in