Comprehensive Thread on Web App Fuzzing!
What is web fuzzing?
How can web fuzzing be super useful in Bug Bounties or Pentest?
FFUF for Web Fuzzing?



{1/16}
Fuzzing is generally finding bugs/issues using automated scanning with supplying unexpected data into an application then monitoring it for exceptions/errors/stacktraces.

The motive is to supply superfluous data to trigger exceptions and see if it could lead to issue.

{2/16}
Fuzzing is since several years and has been done is different ways.
The term "fuzz" originated from a fall 1988 class project in the graduate Advanced Operating Systems class (CS736), taught by Prof. Barton Miller at the University of Wisconsin.

{3/16}
Fuzzing Web Applications :
Web application fuzzing is basically fuzzing web applications to expose common web vulnerabilities which are mentioned in @owasp Top 10.
{4/16}
Steps:
1. Decide the web app type/tech stack (php,aspx,jsp)
2. Check data injection points (input points)
3. fuzzing payloads (fuzzing dictionaries, encoded payloads, superfluous data )
4. Observing the application.
{5/16}
Tools:
FFUF
Wfuzz
Owasp ZAP
Burp suite
boofuzz

{6/16}
Web App Fuzzing using FFUF:
FFUF is a command-line tool for web fuzzing on a web server by author @joohoi written in go.

• Install :
• go get -u github.com/ffuf/ffuf
• apt install ffuf
• ffuf -h

{7/16}
FFUF Fuzzing :
• Simple Attack
ffuf -u test.com/FUZZ/ -w file.txt

• Simple Attack with multiple wordlists & silent
ffuf -u test.com/W2/W1/ -w dict1.txt:W1 -w dict2.txt:W2 -s

• With extensions
ffuf -u test.com -w file.txt -e .php

{8/16}
FFUF Fuzzing :
• POST based
ffuf -request file.txt -request-proto http -mode clusterbomb -w 1.txt:H1 -w 2.txt:H2 -mc 200

•Matching Status Code:
ffuf -u test.com -w file.txt -mc 200

•Matching Lines:
ffuf -u test.com -w file.txt -ml 10

{9/16}
• Matching Words
ffuf -u test.com -w file.txt -mw 10

• Matching Size
ffuf -u test.com -w file.txt -ms 1337

• Matching Regexp
ffuf -u test.com -w file.txt -mr "root:x"

{10/16}
Filter Usage :

• Filter Code (Remove 404 from results)
ffuf -u test.com -w file.txt -fc 404

• Filter Lines (Remove length from results)
ffuf -u test.com -w file.txt -fl 1337

{11/16}
• Filter Size (Filter size from results)
ffuf -u test.com -w file.txt -fs 1337

• Filter Words (Filter size from results)
ffuf -u test.com -w file.txt -fw 1337

• Filter Regexp
ffuf -u test.com -w file.txt -fr 1337
{12/16}
• Add Delay in each requests ( in seconds)
ffuf -u test.com -w file.txt -p 3

• Request Rate Limits ( requests/seconds)
ffuf -u test.com -w file.txt -rate 1337

• Threads Limits
ffuf -u test.com -w file.txt -t 1337

{13/16}
Output Usage:

• O/P in HTML
ffuf -u test.com -w file.txt -o file.html -of html
• O/P in CSV
ffuf -u test.com -w file.txt -o file.csv -of csv
• O/P in CSV (all formats)
ffuf -u test.com -w file.txt -o file -of all

{14/16}
Misc Usage:
• Timeout Requests
ffuf -u test.com -w file.txt -timeout 3
• Host Header
ffuf -u test.com -w file.txt -H "HOST: FUZZ.test.com"
• Recursion ( To recursively fuzz)
ffuf -u test.com -w file.txt -recursion

{15/16}
Misc Usage:

• Replay Proxy (Send requests to burp suite)
ffuf -u test.com -w file.txt -replay-proxy http://127.0.0.1:8080

📽 Video Resources:




{16/16}

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Rohit Gautam 🥑

Rohit Gautam 🥑 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @HackerGautam

6 Jul
Infosec Entry level Interview Questions 101 📜🏆

PS: These are the list of questions I have come across and questions faced by my students in their interviews.

Feel free to add more below 👇

1. What is your fav OWASP Top 10 bug
2. Explain your methodology?
#infosec #bugbounty
3. CSRF vs SSRF
4. What can an attacker do with XSS
5. Requirements of CSRF to happen
6. Root cause of Clickjacking
7. What is diff between SAST & DAST
8. Black/White/Grey Box Testing
9. What is threat, vulnerability, risk
10. What is CIA Triad
11. What are cookie attributes
12. What are most common business logic issues?
13. Question on Burpsuite Tabs
14. What are your fav open source tools?
15. How will you protect against ransomware?
16. What is XXE attack, explain any payload?
17. SSRF and what can be achieved?
18. How can we fix SQLi
#infosec
Read 7 tweets
30 Jun
Github Recon 101 🏆👇

1. Manual Enumeration
2. Automated Enumeration

@shifacyclewala @Hacktifycs
#bugbountytips #bugbounty #infosec #cybersecurity #hacking
💡Manual:
GitHub Dorking is basically finding leaks in the code pushed by the target organisation or its employees.

1. org: evilcorp[.]com
2. language:"bash" org:evilcorp[.]com
3. "target[.]com" language:python "secret" "password" "key" NOT docs NOT sandbox NOT test NOT fake
💡Dorks:

Jenkins
Jira
OTP
oauth
authoriztion
password
pwd
ftp
ssh
dotfiles
JDBC
token
user
pass
secret
SecretAccessKey
AWS_SECRET_ACCESS_KEY
credentials
config
security_credentials
S3
https://
Read 8 tweets
29 Jun
Subdomain Enumeration 101 🏆 👇

1. Passive Enumeration
2. Active Enumeration

@shifacyclewala @Hacktifycs
#bugbountytips #bugbounty #infosec #cybersecurity #hacking
Passive:
1. Google Dorking:
“site:*.example.org -www -store -jobs -uk”
2. virustotal
3. dnsdumpster
4. crt[.]sh
5. censys[.]io
6. Rapid7 Sonar Datasets
7. Dnsbufferover

#bugbountytips #bugbounty #infosec #cybersecurity #hacking
Unique Ways:
1. dig +multi AXFR @ns1.dns.co insecuredns.com
2. CSP (curl -I -s -L https://some[.]com | grep -iE 'Content-Security|CSP')
3. Github Subdomains
4. nmap --script targets-asn --script-args targets-asn.asn=17012
5. Scraping using webscrapers
#bugbountytips
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(