- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 260字
- 2021-07-16 17:53:08
Brute-forcing Web Content
Fuzzing tools such as wfuzz can be used to discover web content by trying different paths, with URIs taken from giant wordlists, then analyzing the HTTP status codes of the responses to discover hidden directories and files. wfuzz is versatile and can do both content-discovery and form-manipulation. It's easy to get started with, and because wfuzz supports plugins, recipes, and other advanced features, it can be extended and customized into other workflows.
The quality of the wordlists you're using to brute-force-discover hidden content is important. After installing wfuzz, clone the SecLists GitHub repository (a curated collection of fuzz lists, SQLi injection scripts, XSS snippets, and other generally malicious input) at https://github.com/danielmiessler/SecLists. We can start a scan of the target site simply be replacing the part of the URL we'd like to replace with the wordlist with the FUZZ string:
wfuzz -w ~/Code/SecLists/Discovery/Web-Content/SVNDigger/all.txt --hc 404 http://webscantest.com/FUZZ
As you can tell from the command, we passed in the web-content discovery list from SVNDigger with the -w flag, -hc tells the scan to ignore 404 status codes (hide code), and then the final argument is the URL we want to target:

You can see some interesting points to explore. While the effectiveness of brute-force tools is dictated by their wordlists, you can find effective jumping-off points as long as you do your research.
Keep in mind that brute-forcers are very noisy. Only use them against isolated staging/QA environments, and only with permission. If your brute-forcer overwhelms a production server, it's really no different from a DoS attack.
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- Practical Network Scanning
- 白帽子講Web安全(紀(jì)念版)
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- Learning Veeam? Backup & Replication for VMware vSphere
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 可信計(jì)算3.0工程初步(第二版)
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- SQL Injection Strategies
- 信息內(nèi)容安全管理及應(yīng)用
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- 一本書讀透金融科技安全
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御