FUFF
Fuzz Faster U Fool is an open-source web fuzzing tool designed for discovering hidden files and directories on web servers by employing brute-force techniques
Subdomains
-fsfilters size of responses (may need to check first)
Directories
-recursion: Adds recursion : set to true-recursion-depth: How many levels? : 0-x-fc: Filters HTTP status codes (i.e redirects)
POST Requests
- Run this first to see the size of the request
- And then run this to filter the size you don't want
Usernames
-
-wselects the file's location on the computer that contains the list of usernames that we're going to check exists. -
-Xspecifies the request method, this will be a GET request by default, but it is a POST request in our example. -
-dspecifies the data that we are going to send. In our example, we have the fields username, email, password and cpassword.
We've set the value of the username to FUZZ. In the ffuf tool, the FUZZ keyword signifies where the contents from our wordlist will be inserted in the request.
-
-His used for adding additional headers to the request. In this instance, we're setting the Content-Type so the web server knows we are sending form data. -
-uspecifies the URL we are making the request to, and finally, -
-mris the text on the page we are looking for to validate we've found a valid username.
Bruteforce Login
In this instance, we've chosen W1 for our list of valid usernames and W2 for the list of passwords we will try.
The multiple wordlists are again specified with the -w argument but separated with a comma.
For a positive match, we're using the -fc argument to check for an HTTP status code other than 200.