官术网_书友最值得收藏!

Brute forces/predictable resource locators

Web brute forces or discovery tools are used to find content such as files, directories, servlets, or parameters through dictionary attacks. These tools use word lists which have been put together by security professionals during the last 10 years, which contain known filename directories or just words found in different products or web applications.

The precursor for these types of tools was DIRB (http://dirb.sourceforge.net/), which is still available and maintained by Dark Raver. Another great alternative is Wfuzz (http://www.edge-security.com/wfuzz.php), which I developed in the past and is now maintained and developed by Xavier Mendez. You can find this tool in Kali, the most used penetration testing distribution.

Tools such as Burp and ZAP provide these capabilities. All these tools benefit from word lists such as the ones provided by FUZZDB (https://github.com/fuzzdb-project), a database of wordlists for web application testing. We'll see how to build a tool for this purpose similar to Wfuzz.

主站蜘蛛池模板: 丹凤县| 冕宁县| 通道| 印江| 修水县| 太和县| 崇礼县| 灵寿县| 冀州市| 宜川县| 花莲市| 蓝山县| 嘉定区| 盐亭县| 额尔古纳市| 延庆县| 逊克县| 玉林市| 卓尼县| 蒙阴县| 乐至县| 比如县| 长丰县| 镇雄县| 漠河县| 宜城市| 普格县| 紫阳县| 察隅县| 南皮县| 承德县| 城固县| 甘孜县| 大足县| 雅安市| 当阳市| 万州区| 镇安县| 栾川县| 临清市| 五常市|