- Learning Python Web Penetration Testing
- Christian Martorella
- 157字
- 2021-06-25 20:54:48
Brute forces/predictable resource locators
Web brute forces or discovery tools are used to find content such as files, directories, servlets, or parameters through dictionary attacks. These tools use word lists which have been put together by security professionals during the last 10 years, which contain known filename directories or just words found in different products or web applications.
The precursor for these types of tools was DIRB (http://dirb.sourceforge.net/), which is still available and maintained by Dark Raver. Another great alternative is Wfuzz (http://www.edge-security.com/wfuzz.php), which I developed in the past and is now maintained and developed by Xavier Mendez. You can find this tool in Kali, the most used penetration testing distribution.
Tools such as Burp and ZAP provide these capabilities. All these tools benefit from word lists such as the ones provided by FUZZDB (https://github.com/fuzzdb-project), a database of wordlists for web application testing. We'll see how to build a tool for this purpose similar to Wfuzz.
- Dynamics 365 for Finance and Operations Development Cookbook(Fourth Edition)
- Clojure Programming Cookbook
- Java程序設計與開發
- Learning NServiceBus(Second Edition)
- 程序員面試白皮書
- Python for Secret Agents:Volume II
- Developing Mobile Web ArcGIS Applications
- 信息可視化的藝術:信息可視化在英國
- 編寫高質量代碼:改善C程序代碼的125個建議
- Mastering Google App Engine
- ADI DSP應用技術集錦
- Oracle Exadata專家手冊
- Getting Started with Hazelcast(Second Edition)
- Unity 3D/2D移動開發實戰教程
- Mastering Docker