Fuzzing
Fuzzing for Loot!
Last updated
Fuzzing for Loot!
Last updated
Fuzzing is a software testing technique that involves feeding random or invalid data into a program to find security vulnerabilities and coding errors. The goal is to crash the program and identify faults that might not be found through traditional testing methods. In particular, web fuzzing can be used for a variety of uses such as directory enumeration, IDOR, username and password enumeration, and more.
There are many ffuf
matcher options included to help create useful output:
-mc
: Match HTTP status codes i.e. 200
-ml
: Match amount of lines in response
-mr
: Match regexp
-ms
: Match HTTP response size
-mw
: Match amount of words in response
Filters can also be used to remove specific results:
-fc
: Filter HTTP status codes
-fl
: Filter by amount of lines in response
-fr
: Filter regexp
-fs
: Filter HTTP response size
-fw
: Filter by amount of words in response
When creating the command, FUZZ will be used to specify where the username would go in the request parameters.
Example:
Although a tool like hydra
might be better for this, ffuf
can also be used to brute force credentials. Since there's two wordlists, there's a need to specify wordlists in this case.
Example: