Listen to this Post
Fuzzing is a critical technique in penetration testing, and `ffuf` (Fuzz Faster U Fool) is one of the most powerful tools for web directory and parameter discovery. Below is a comprehensive guide to using `ffuf` effectively, along with practical commands and examples.
Basic ffuf Commands
1. Directory Fuzzing
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ
– -w
: Specifies the wordlist.
– -u
: Target URL with `FUZZ` as the placeholder.
2. Subdomain Enumeration
ffuf -w subdomains.txt -u https://FUZZ.target.com -H "Host: FUZZ.target.com" -fs 0
– -fs 0
: Filters out responses of size 0 (common for invalid subdomains).
3. File Extension Fuzzing
ffuf -w wordlist.txt -u https://target.com/FUZZ.php -e .bak,.old,.txt
– -e
: Adds file extensions to test.
4. Parameter Fuzzing (GET/POST)
ffuf -w params.txt -u https://target.com/script.php?FUZZ=test -fs 0
For POST requests:
ffuf -w params.txt -X POST -d "FUZZ=test" -u https://target.com/login.php -H "Content-Type: application/x-www-form-urlencoded"
Advanced ffuf Techniques
5. Recursive Fuzzing
ffuf -w wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2
– -recursion
: Enables recursive scanning.
– -recursion-depth
: Limits recursion depth.
6. Filtering by Response Size/Code
ffuf -w wordlist.txt -u https://target.com/FUZZ -fc 403,404 -fs 1024
– -fc
: Filters specific HTTP status codes.
– -fs
: Filters specific response sizes.
7. Rate Limiting & Delays
ffuf -w wordlist.txt -u https://target.com/FUZZ -p 0.5 -t 50
– -p
: Delay between requests (seconds).
– -t
: Number of concurrent threads.
8. Authentication & Headers
ffuf -w wordlist.txt -u https://target.com/FUZZ -H "Authorization: Bearer TOKEN" -H "X-Custom-Header: value"
You Should Know: Practical ffuf Use Cases
- Finding Hidden Admin Panels
ffuf -w admin_paths.txt -u https://target.com/FUZZ -fc 404
Brute-Forcing Login Pages
ffuf -w passwords.txt -u https://target.com/login -d "username=admin&password=FUZZ" -H "Content-Type: application/x-www-form-urlencoded" -fc 401
Discovering Backup Files
ffuf -w common_files.txt -u https://target.com/FUZZ -e .bak,.old,.swp
What Undercode Say
`ffuf` is an indispensable tool for penetration testers, offering speed, flexibility, and precision in web fuzzing. Mastering its flags (-recursion
, -fs
, -fc
) and combining it with custom wordlists can uncover hidden vulnerabilities efficiently.
For further learning, check out these courses:
Expected Output:
A structured, actionable `ffuf` cheatsheet with real-world commands for penetration testers.
References:
Reported By: Zlatanh Ultimate – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅