Fuzzing

Fuzzing is a key technique in web security used to find hidden directories or files on a website. These hidden paths can expose sensitive information, such as admin panels, backups, or configuration files, that may not be meant for public access.

Directory Fuzzing

ffuf -u <URL>/FUZZ -w <WORDLIST> -fc 400,401,402,403,404,429,500,501,502,503 \
    -recursion -recursion-depth 2 \
    -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0" \
    -H "X-Forwarded-For: 127.0.0.1" -H "X-Originating-IP: 127.0.0.1" \
    -H "X-Forwarded-Host: localhost" -t 100 -r

gobuster dir -u <URL> -w <WORDLIST> --follow-redirect --random-agent \
    -H "X-Forwarded-For: 127.0.0.1" -H "X-Originating-IP: 127.0.0.1" \
    -H "X-Forwarded-Host: localhost" --expanded --threads 100 \
    --status-codes-blacklist 400,401,402,403,404,429,500,501,502,503

dirb <URL> [<WORDLIST>] \
    -a "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0" \
    -z 400,401,402,403,404,429,500,501,502,503 \
    -S -w

File Fuzzing

ffuf -w <WORDLIST> -u <URL>/FUZZ -fc 400,401,402,403,404,429,500,501,502,503 \
    -recursion -recursion-depth 2 \
    -e .html,.php,.txt,.pdf,.js,.css,.zip,.bak,.old,.log,.json,.xml,.config,.env,.asp,.aspx,.jsp,.gz,.tar,.sql,.db \
    -ac -c -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0" \
    -H "X-Forwarded-For: 127.0.0.1" -H "X-Originating-IP: 127.0.0.1" \
    -H "X-Forwarded-Host: localhost" -t 100 -r -o results.json

Custom Wordlists

Juicy Files from LostSec

Last updated

Was this helpful?