[go: up one dir, main page]

0% found this document useful (0 votes)
81 views1 page

WFUZZ For Cyber Warriors

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 1

WFUZZ

WFuzzwasdevelopedbyEdgeSecurity;itis
writteninpythonanditisusedbycyberwarriors
forwebapplicationbruteforcingtofindvarious
vulnerabilitiessuchascredentials,path
traversals,injections,resourcelocations,cross
sitescripting,sessionid's,headersand
authenticationflaws.,Wfuzzisalreadyavailable
inkalilinux.
FewsimpleexamplesofWfuzzusage:
1.CheckiftargetsiteisvulnerabletoSQL
Injections
wfuzz.py -c -z
file,'/usr/share/wfuzz/wordlist/vulns/sql_inj
.txt' -v --hc 404
http://www.target.com/check.php/id=FUZZ
cstatesforcolouredoutput,zspecifiesthe
payload,vforverbosemode,hcforhiding
specifiedresponsecodesprovided.
2.BasicFuzzing
wfuzz.py -c -z
file,'/usr/share/wfuzz/wordlist/general/com
mon.txt' -v --hc 404
http://www.target.com/FUZZ
Itcanalsobeusedtoperformothervulnerability
assessments,thereareotheroptionsavailablein
wfuzzgiveitatrytoimproveyourknowledge.

You might also like