官术网_书友最值得收藏!

Brute forces/predictable resource locators

Web brute forces or discovery tools are used to find content such as files, directories, servlets, or parameters through dictionary attacks. These tools use word lists which have been put together by security professionals during the last 10 years, which contain known filename directories or just words found in different products or web applications.

The precursor for these types of tools was DIRB (http://dirb.sourceforge.net/), which is still available and maintained by Dark Raver. Another great alternative is Wfuzz (http://www.edge-security.com/wfuzz.php), which I developed in the past and is now maintained and developed by Xavier Mendez. You can find this tool in Kali, the most used penetration testing distribution.

Tools such as Burp and ZAP provide these capabilities. All these tools benefit from word lists such as the ones provided by FUZZDB (https://github.com/fuzzdb-project), a database of wordlists for web application testing. We'll see how to build a tool for this purpose similar to Wfuzz.

主站蜘蛛池模板: 贡觉县| 象山县| 廊坊市| 梁平县| 红桥区| 郓城县| 墨脱县| 承德市| 平阳县| 台江县| 黎城县| 德清县| 宜黄县| 五指山市| 石阡县| 平南县| 衡东县| 南宫市| 宁乡县| 鹤壁市| 道孚县| 隆昌县| 保康县| 武夷山市| 商都县| 嘉义县| 横山县| 盐边县| 祁阳县| 蒙城县| 南皮县| 平武县| 思南县| 于都县| 隆尧县| 商水县| 盘山县| 三江| 剑川县| 安徽省| 彭阳县|