ffuf utiliza una lista de palabras clave o diccionario para generar solicitudes HTTP manipuladas y ver cómo responde la aplicación.
Ataque de fuzzing en una URL específica
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ
Fuzzing buscando archivos específicos
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ -e .jpg,.pdf
Copiar ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt:FUZZ -u https://FUZZ.example.com/
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ -recursion -recursion-depth 2
Respuestas con un código de estado HTTP 200
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ -mc 200
Copiar ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt:FUZZ -u http://94.237.48.48:54645/ -H 'Host: FUZZ.academy.htb' -ms 0
Copiar ffuf -w /usr/share/dirb/wordlists/common.txt -t 50 -u http://192.168.10.10 -H "HOST: FUZZ.randomtarget.com" -fs 612
/ '___\ /' ___\ / '___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v1.1.0-git
________________________________________________
:: Method : GET
:: URL : http://192.168.10.10
:: Wordlist : FUZZ: ./vhosts
:: Header : Host: FUZZ.randomtarget.com
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403,405
:: Filter : Response size: 612
________________________________________________
dev-admin [Status: 200, Size: 120, Words: 7, Lines: 12]
www [Status: 200, Size: 185, Words: 41, Lines: 9]
some [Status: 200, Size: 195, Words: 41, Lines: 9]
:: Progress: [12/12] :: Job [1/1] :: 0 req/sec :: Duration: [0:00:00] :: Errors: 0 ::
Copiar ffuf -w /usr/share/seclists/Discovery/Web-Content/web-extensions.txt -u http://faculty.academy.htb:40053/indexFUZZ
Fuzzing de parámetros de URL
Copiar ffuf -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt:FUZZ -u http://admin.academy.htb:PORT/admin/admin.php?FUZZ=key -fs 774
Copiar ffuf -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt:FUZZ -u http://admin.academy.htb:PORT/admin/admin.php -X POST -d 'FUZZ=key' -H 'Content-Type: application/x-www-form-urlencoded' -fs 774
Fuzzing con Cookie Session
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ -H "Cookie: sessionid=123456"
Guardar resultados en HTML
Copiar ffuf -w rockyou.txt -u http://example.com/FUZZ -o output.txt -of html
Fuzzing avanzado con ffuf
Utilizar varios diccionarios simultáneamente
Copiar ffuf -u http://IP_VICTIM/W1/W2 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt:W1 -w /usr/share/seclists/Fuzzing/LFI/LFI-Jhaddix.txt:W2
Fuzzing de USER o PASSWORD en Login
Copiar ffuf -request request-bwap -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-small.txt