Web Tool - WFuzz

A tool to FUZZ web applications anywhere.

Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.

Installation

Installed in Kali

Github: https://github.com/xmendez/wfuzz

pip install wfuzz

Filtering options

--hs/ss "regex" #Hide/Show
#Simple example, match a string: "Invalid username"
#Regex example: "Invalid *"

--hc/sc CODE #Hide/Show by code in response
--hl/sl NUM #ide/Show by number of lines in response
--hw/sw NUM #ide/Show by number of words in response
--hc/sc NUM #ide/Show by number of chars in response

Output options

Encoders options

In order to use a encoder, you have to indicate it in the "-w" or "-z" option.

Examples:

CheetSheet

Login Form bruteforce

POST, Single list, filter string (hide)

POST, 2 lists, filder code (show)

GET, 2 lists, filter string (show), proxy, cookies

Bruteforce Dicrectory/RESTful bruteforce

Arjun parameters wordlist

Path Parameters BF

Header Authentication

Basic, 2 lists, filter string (show), proxy

NTLM, 2 lists, filter string (show), proxy

User-Agent, filter code (hide), proxy

Host

HTTP Verbs (methods) bruteforce

Using file

Using inline list

Directory & Files Bruteforce

Tool to bypass Webs

https://github.com/carlospolop/fuzzhttpbypass

Last updated