A general web fuzzing tool. Use FUZZ
as your placeholder.
Directory/file enumeration
How to enumerate URL paths with fuff
Link to original
Brute force virtual hosts
How to brute force virtual host entries with fuff
fuff can fuzz HTTP headers, which can be used to try to brute force virtual host entries.
Use
Link to original-fs $SIZE
to remove results of a particular size from the list (which you’ll probably need to do when trying to brute force virtual hosted subdomains).
Username enumeration
How to enumerate users with fuff
Assuming that our login or password reset form isn’t AJAX-y:
Here
Link to original$POST_VARS
should look something likeusername=FUZZ&email=FUZZ@example.com&password=1234&cpassword=1234
. The-mr
flag instructs ffuf to filter on page text for a “successful hit”;-s
supresses all output except successful fuzzes (as defined by-mr
).
Brute force login credentials
How to brute force login credentials with fuff
Here we assign W1 and W2 to take terms from the two supplied wordlists;
$POST_VARS
then looks something likeusername=W1&password=W2
. This example assumes that a successful login will return an HTTP status code other than 200 (probably a 301 or 302);-s
supresses all output except successful fuzzes (the inverse of-fc
).Note that ffuf will try every possible combination of elements between the two wordlists, which means that the number of combinations tried grows geometrically. So you probably don’t want to try the above example directly, but rather generate a shorter user list first via enumeration (see the previous section).
Link to original