Attacking Web Applications With Ffuf (Check)
#Example Fuzzing Directories
ffuf -w <Word-List>:FUZZ -u http://<Server-IP>:<Port-Number>/FUZZ
#Example Extension Fuzzing
ffuf -w <Word-List>:FUZZ -u http://<Server-IP>:<Port-Number>/index.FUZZ
#Example Fuzzing Pages
ffuf -w <Word-List>:FUZZ -u http://<Server-IP>:<Port-Number>/FUZZ.<Extension>
#Example Recursive (-v to output full URLs.) (-e to set the extension)
ffuf -w <Word-List>:FUZZ -u http://<Server-IP>:<Port-Number>/FUZZ -recursion -recursion-depth <Int-Depth-Limit> -e <Extension> -v
#Example Fuzzing Subdomains
ffuf -w <Word-List>:FUZZ -u http://FUZZ.<Server-IP>:<Port-Number>/
#Fuzzing VHosts, this will generate 200 for all the requests so you need to filter the results by identifying first the unique value of the incorrect result to filter on it.
ffuf -w <Word-List>:FUZZ -u http://<Server-IP>:<Port-Number>/ -H 'Host: FUZZ.<Server-IP>:<Port-Number> -fs <Size-To-Filter>'
#Example Fuzzing Parameters for type GET. Same with the VHosts you will get many false negatives so make sure to filter after identifying the incorrect result to filter on.
ffuf -w <Word-List>:FUZZ -u http://FUZZ.<Server-IP>:<Port-Number><Endpoint>?FUZZ=<Value> -fs <Size-To-Filter>
#Example Fuzzing Parameters for type POST.
ffuf -w <Word-List>:FUZZ -u http://FUZZ.<Server-IP>:<Port-Number><Endpoint> -X POST -d 'FUZZ=<Value>' -H 'Content-Type: application/x-www-form-urlencoded' -fs <Size-To-Filter>
#Code to add entities to the hosts file.
sudo sh -c 'echo "<Server-IP> <URL>" >> /etc/hosts'Last updated