wfuzz info2

来源:互联网 发布:淘宝众筹产品首页 编辑:程序博客网 时间:2024/06/03 16:58
********************************************************* Wfuzz  2.0 - The Web Bruteforcer                     *********************************************************Usage: /usr/bin/wfuzz [options] <url>Options:-c                : Output with colors   带颜色输出-v                : Verbose information  版本信息-o printer            : Output format by stderr  格式化输出-p addr                : use Proxy (ip:port or ip:port-ip:port-ip:port)   使用代理-x type                : use SOCK proxy (SOCKS4,SOCKS5)   使用sock-t N                : Specify the number of threads (20 default)   进程-s N                : Specify time delay between requests (0 default)   超时时间-e <type>            : List of available encodings/payloads/iterators/printers   类型(编码)-R depth            : Recursive path discovery   -I                : Use HTTP HEAD instead of GET method (No HTML body responses). --follow            : Follow redirections-m iterator            : Specify iterator (product by default)-z payload            : Specify payload (type,parameters,encoding)-V alltype            : All parameters bruteforcing (allvars and allpost). No need for FUZZ keyword.-X                : Payload within HTTP methods (ex: "FUZZ HTTP/1.0"). No need for FUZZ keyword.-b cookie            : Specify a cookie for the requests   cookie值-d postdata             : Use post data (ex: "id=FUZZ&catalogue=1")   post数据包 -H headers              : Use headers (ex:"Host:www.mysite.com,Cookie:id=1312321&user=FUZZ")   使用头--basic/ntlm/digest auth    : in format "user:pass" or "FUZZ:FUZZ" or "domain\FUZ2Z:FUZZ"--hc/hl/hw/hh N[,N]+        : Hide resposnes with the specified[s] code/lines/words/chars (Use BBB for taking values from baseline)  隐藏特殊响应(状态码,chars响应头长度)--hs regex            : Hide responses with the specified regex within the responseKeyword: FUZZ,FUZ2Z  wherever you put these words wfuzz will replace them by the payload selected. Example: - wfuzz.py -c -z file,commons.txt --hc 404 -o html http://www.site.com/FUZZ 2> res.html  猜解目录名     - wfuzz.py -c -z file,users.txt -z file,pass.txt --hc 404 http://www.site.com/log.asp?user=FUZZ&pass=FUZ2Z     - wfuzz.py -c -z range,1-10 --hc=BBB http://www.site.com/FUZZ{something}
复制代码

使用帮助:

路径扫描

对比下面这张

通过一些参数,可以更快的帮组我们渗透

 

爆破用户名及密码:

 

测试注入:这里我没有演示,我们可以将一些注入语句写在文件中,这样我们可以通过wfuzz来进行注入扫描

0 0