- Learning Python Web Penetration Testing
- Christian Martorella
- 157字
- 2021-06-25 20:54:48
Brute forces/predictable resource locators
Web brute forces or discovery tools are used to find content such as files, directories, servlets, or parameters through dictionary attacks. These tools use word lists which have been put together by security professionals during the last 10 years, which contain known filename directories or just words found in different products or web applications.
The precursor for these types of tools was DIRB (http://dirb.sourceforge.net/), which is still available and maintained by Dark Raver. Another great alternative is Wfuzz (http://www.edge-security.com/wfuzz.php), which I developed in the past and is now maintained and developed by Xavier Mendez. You can find this tool in Kali, the most used penetration testing distribution.
Tools such as Burp and ZAP provide these capabilities. All these tools benefit from word lists such as the ones provided by FUZZDB (https://github.com/fuzzdb-project), a database of wordlists for web application testing. We'll see how to build a tool for this purpose similar to Wfuzz.
- Mastering Concurrency Programming with Java 8
- Learn Blockchain Programming with JavaScript
- Python進(jìn)階編程:編寫更高效、優(yōu)雅的Python代碼
- Oracle Exadata專家手冊
- Spring Boot進(jìn)階:原理、實(shí)戰(zhàn)與面試題分析
- C語言程序設(shè)計(jì)教程
- C++語言程序設(shè)計(jì)
- 微課學(xué)人工智能Python編程
- 零基礎(chǔ)看圖學(xué)ScratchJr:少兒趣味編程(全彩大字版)
- C語言程序設(shè)計(jì)實(shí)踐
- JavaScript悟道
- C語言從入門到精通
- 計(jì)算機(jī)系統(tǒng)解密:從理解計(jì)算機(jī)到編寫高效代碼
- Unreal Engine Game Development Cookbook
- LabVIEW案例實(shí)戰(zhàn)