Web Tool - WFuzz
A tool to FUZZ web applications anywhere.
Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
Installation
Installed in Kali
Github: https://github.com/xmendez/wfuzz
Filtering options
--hs/ss "regex" --hc/sc CODE --hl/sl NUM --hw/sw NUM --hc/sc NUM Output options
wfuzz -e printers -f /tmp/output,csv Encoders options
In order to use a encoder, you have to indicate it in the "-w" or "-z" option.
Examples:
-z file,/path/to/file,md5 -w /path/to/file,base64 -z list,each-element-here,hexlify CheetSheet
Login Form bruteforce
POST, Single list, filter string (hide)
POST, 2 lists, filder code (show)
GET, 2 lists, filter string (show), proxy, cookies
Bruteforce Dicrectory/RESTful bruteforce
Path Parameters BF
Basic, 2 lists, filter string (show), proxy
NTLM, 2 lists, filter string (show), proxy
Cookie, filter code (show), proxy
User-Agent, filter code (hide), proxy
Host
HTTP Verbs (methods) bruteforce
Using file
Using inline list
Directory & Files Bruteforce
最后更新于
这有帮助吗?