wfuzz

sudo apt install wfuzz

#Fuzzing a specific domain

wfuzz -H โ€˜HOST: FUZZ.shuriken.localโ€™ -u โ€˜http://10.10.10.10โ€™ -w /usr/share/dirb/wordlist/big.txt

#Fuzzing a specific parameter

Example target : http://192.168.101.143/search1.php?id=about.php

Fuzzing:

wfuzz -c -w /usr/share/wordlists/dirb/big.txt -u http://192.168.101.143/search1.php?FUZZ=about.php --hw 288

--hw will parse through false positives

#Attacking a login page

sudo wfuzz -c -w pass.txt -d โ€œusername=redcliff&pass=FUZZโ€ --hc 200 10.10.10.10/login.php

#Looking for common directories

wfuzz -w wordlist/general/common.txt http://testphp.vulnweb.com/FUZ

#Looking for common Files

wfuzz -w wordlist/general/common.txt http://testphp.vulnweb.com/FUZZ.php

#Fuzzing URLs

You often want to fuzz some sort of data in the URLโ€™s query string, this can be achieved by specifying the FUZZ keyword in the URL after a question mark

wfuzz -z range,0-10 --hl 97 http://testphp.vulnweb.com/listproducts.php?cat=FUZZ

#Fuzz a post request If you want to fuzz some form-encoded data like an HTML form will do, simply pass a -d command line argument

wfuzz -z file,wordlist/others/common_pass.txt -d "uname=FUZZ&pass=FUZZ" --hc 302 http://testphp.vulnweb.com/userinfo.php

Last updated