官术网_书友最值得收藏!

Brute-forcing Web Content

Fuzzing tools such as wfuzz can be used to discover web content by trying different paths, with URIs taken from giant wordlists, then analyzing the HTTP status codes of the responses to discover hidden directories and files. wfuzz is versatile and can do both content-discovery and form-manipulation. It's easy to get started with, and because wfuzz supports plugins, recipes, and other advanced features, it can be extended and customized into other workflows.

The quality of the wordlists you're using to brute-force-discover hidden content is important. After installing wfuzz, clone the SecLists GitHub repository (a curated collection of fuzz lists, SQLi injection scripts, XSS snippets, and other generally malicious input) at https://github.com/danielmiessler/SecLists. We can start a scan of the target site simply be replacing the part of the URL we'd like to replace with the wordlist with the FUZZ string:

wfuzz -w ~/Code/SecLists/Discovery/Web-Content/SVNDigger/all.txt --hc 404 http://webscantest.com/FUZZ

As you can tell from the command, we passed in the web-content discovery list from SVNDigger with the -w flag, -hc tells the scan to ignore 404 status codes (hide code), and then the final argument is the URL we want to target:

You can see some interesting points to explore. While the effectiveness of brute-force tools is dictated by their wordlists, you can find effective jumping-off points as long as you do your research.

Keep in mind that brute-forcers are very noisy. Only use them against isolated staging/QA environments, and only with permission. If your brute-forcer overwhelms a production server, it's really no different from a DoS attack.

主站蜘蛛池模板: 佛冈县| 汪清县| 青海省| 嘉禾县| 南平市| 会同县| 富顺县| 茂名市| 分宜县| 太湖县| 龙井市| 永康市| 巴林右旗| 汶川县| 安顺市| 虞城县| 忻州市| 崇文区| 北海市| 大兴区| 鹿邑县| 洪洞县| 屏南县| 刚察县| 壶关县| 灵山县| 礼泉县| 喀喇沁旗| 沈阳市| 四川省| 图木舒克市| 蒙自县| 闸北区| 大埔县| 兴仁县| 鄂温| 蒙城县| 新蔡县| 宜春市| 南阳市| 清丰县|