1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-08-07 17:35:42 +02:00

wfuzz: edit page (#12519)

* wfuzz: edit page

---------

Co-authored-by: Vitor Henrique <87824454+vitorhcl@users.noreply.github.com>
This commit is contained in:
Fazle Arefin 2024-03-20 20:16:29 +11:00 committed by GitHub
parent b7849660f0
commit 3a44ecadcb
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -3,18 +3,22 @@
> A web application bruteforcer.
> More information: <https://wfuzz.readthedocs.io/en/latest/user/basicusage.html>.
- Directory and file bruteforce using the specified wordlist and also proxying the traffic:
- Directory and file bruteforce using the specified [w]ordlist and also [p]roxying the traffic:
`wfuzz -w {{path/to/file}} -p {{127.0.0.1:8080}} {{http://example.com/FUZZ}}`
- Save the results to a file:
- Save the results to a [f]ile:
`wfuzz -w {{path/to/file}} -f {{filename}} {{http://example.com/FUZZ}}`
- Show colorized output while only showing the declared response codes in the output:
- Show [c]olorized output while only showing the declared response codes in the output:
`wfuzz -c -w {{path/to/file}} --sc {{200,301,302}} {{http://example.com/FUZZ}}`
- Use a custom header to fuzz subdomains while hiding specific response codes and word counts. Increase the threads to 100 and include the target ip/domain:
- Use a custom [H]eader to fuzz subdomains while [h]iding specific response [c]odes and word counts. Increase the [t]hreads to 100 and include the target ip/domain:
`wfuzz -w {{path/to/file}} -H {{"Host: FUZZ.example.com"}} --hc {{301}} --hw {{222}} -t {{100}} {{example.com}}`
- Brute force Basic Authentication using a list of usernames and passwords from files for each FUZ[z] keyword, [h]iding response [c]odes of unsuccessful attempts:
`wfuzz -c --hc {{401}} -s {{delay_between_requests_in_seconds}} -z file,{{path/to/usernames}} -z file,{{path/to/passwords}} --basic 'FUZZ:FUZ2Z' {{https://example.com}}`