Web Tool - WFuzz
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
A tool to FUZZ web applications anywhere.
Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
Installation
Installed in Kali
Github: https://github.com/xmendez/wfuzz
pip install wfuzzFiltering options
--hs/ss "regex" #Hide/Show
#Simple example, match a string: "Invalid username"
#Regex example: "Invalid *"
--hc/sc CODE #Hide/Show by code in response
--hl/sl NUM #Hide/Show by number of lines in response
--hw/sw NUM #Hide/Show by number of words in response
--hh/sh NUM #Hide/Show by number of chars in response
--hc/sc NUM #Hide/Show by response codeOutput options
Encoders options
In order to use an encoder, you have to indicate it in the "-w" or "-z" option.
Examples:
CheatSheet
Login Form bruteforce
POST, Single list, filter string (hide)
POST, 2 lists, filter code (show)
GET, 2 lists, filter string (show), proxy, cookies
Bruteforce Directory/RESTful bruteforce
Path Parameters BF
Header Authentication
Basic, 2 lists, filter string (show), proxy
NTLM, 2 lists, filter string (show), proxy
Cookie/Header bruteforce (vhost brute)
Cookie, filter code (show), proxy
User-Agent, filter code (hide), proxy
Host
HTTP Verbs (methods) bruteforce
Using file
Using inline list
Directory & Files Bruteforce
Tool to bypass Webs
https://github.com/carlospolop/fuzzhttpbypass
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Last updated