<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Wfuzz</id>
	<title>Wfuzz - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Wfuzz"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Wfuzz&amp;action=history"/>
	<updated>2026-04-08T12:23:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Wfuzz&amp;diff=68003&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;Sumber: https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz   Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple c...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Wfuzz&amp;diff=68003&amp;oldid=prev"/>
		<updated>2023-02-11T01:57:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sumber: https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz   Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple c...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Installed in Kali&lt;br /&gt;
&lt;br /&gt;
Github: ​&lt;br /&gt;
 pip install wfuzz&lt;br /&gt;
&lt;br /&gt;
==Filtering options==&lt;br /&gt;
&lt;br /&gt;
 --hs/ss &amp;quot;regex&amp;quot; #Hide/Show&lt;br /&gt;
&lt;br /&gt;
 #Simple example, match a string: &amp;quot;Invalid username&amp;quot;&lt;br /&gt;
 #Regex example: &amp;quot;Invalid *&amp;quot;&lt;br /&gt;
​&lt;br /&gt;
 --hc/sc CODE #Hide/Show by code in response&lt;br /&gt;
 --hl/sl NUM #Hide/Show by number of lines in response&lt;br /&gt;
 --hw/sw NUM #Hide/Show by number of words in response&lt;br /&gt;
 --hh/sh NUM #Hide/Show by number of chars in response&lt;br /&gt;
 --hc/sc NUM #Hide/Show by response code&lt;br /&gt;
&lt;br /&gt;
==Output options==&lt;br /&gt;
&lt;br /&gt;
 wfuzz -e printers         #Prints the available output formats&lt;br /&gt;
       -f /tmp/output,csv  #Saves the output in that location in csv format&lt;br /&gt;
&lt;br /&gt;
==Encoders options==&lt;br /&gt;
&lt;br /&gt;
 wfuzz -e encoders #Prints the available encoders&lt;br /&gt;
&lt;br /&gt;
 #Examples: urlencode, md5, base64, hexlify, uri_hex, doble urlencode&lt;br /&gt;
&lt;br /&gt;
In order to use a encoder, you have to indicate it in the &amp;quot;-w&amp;quot; or &amp;quot;-z&amp;quot; option.&lt;br /&gt;
Examples:&lt;br /&gt;
 -z file,/path/to/file,md5 #Will use a list inside the file, and will trnasform each value into its md5 hash before sending it&lt;br /&gt;
 -w /path/to/file,base64 #Will use a list, and transforms to base64&lt;br /&gt;
 -z list,each-element-here,hexlify #Inline list and to hex before sending values&lt;br /&gt;
&lt;br /&gt;
==CheetSheet==&lt;br /&gt;
&lt;br /&gt;
===Login Form bruteforce===&lt;br /&gt;
POST, Single list, filter string (hide)&lt;br /&gt;
 wfuzz -c -w users.txt --hs &amp;quot;Login name&amp;quot; -d &amp;quot;name=FUZZ&amp;amp;password=FUZZ&amp;amp;autologin=1&amp;amp;enter=Sign+in&amp;quot; http://zipper.htb/zabbix/index.php&lt;br /&gt;
&lt;br /&gt;
 #Here we have filtered by line&lt;br /&gt;
&lt;br /&gt;
POST, 2 lists, filder code (show)&lt;br /&gt;
 wfuzz.py -c -z file,users.txt -z file,pass.txt --sc 200 -d &amp;quot;name=FUZZ&amp;amp;password=FUZ2Z&amp;amp;autologin=1&amp;amp;enter=Sign+in&amp;quot; http://zipper.htb/zabbix/index.php&lt;br /&gt;
&lt;br /&gt;
#Here we have filtered by code&lt;br /&gt;
GET, 2 lists, filter string (show), proxy, cookies&lt;br /&gt;
 wfuzz -c -w users.txt -w pass.txt --ss &amp;quot;Welcome &amp;quot; -p 127.0.0.1:8080:HTTP -b &amp;quot;PHPSESSIONID=1234567890abcdef;customcookie=hey&amp;quot; &amp;quot;http://example.com/index.php?username=FUZZ&amp;amp;password=FUZ2Z&amp;amp;action=sign+in&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Bruteforce Dicrectory/RESTful bruteforce===&lt;br /&gt;
​​&lt;br /&gt;
 wfuzz -c -w /tmp/tmp/params.txt --hc 404 https://domain.com/api/FUZZ&lt;br /&gt;
&lt;br /&gt;
===Path Parameters BF===&lt;br /&gt;
&lt;br /&gt;
 wfuzz -c -w ~/git/Arjun/db/params.txt --hw 11 'http://example.com/path%3BFUZZ=FUZZ'&lt;br /&gt;
&lt;br /&gt;
===Header Authentication===&lt;br /&gt;
&lt;br /&gt;
Basic, 2 lists, filter string (show), proxy&lt;br /&gt;
 wfuzz -c -w users.txt -w pass.txt -p 127.0.0.1:8080:HTTP --ss &amp;quot;Welcome&amp;quot; --basic FUZZ:FUZ2Z &amp;quot;http://example.com/index.php&amp;quot;&lt;br /&gt;
NTLM, 2 lists, filter string (show), proxy&lt;br /&gt;
 wfuzz -c -w users.txt -w pass.txt -p 127.0.0.1:8080:HTTP --ss &amp;quot;Welcome&amp;quot; --ntlm 'domain\FUZZ:FUZ2Z' &amp;quot;http://example.com/index.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Cookie/Header bruteforce (vhost brute)===&lt;br /&gt;
Cookie, filter code (show), proxy&lt;br /&gt;
 wfuzz -c -w users.txt -p 127.0.0.1:8080:HTTP --ss &amp;quot;Welcome &amp;quot; -H &amp;quot;Cookie:id=1312321&amp;amp;user=FUZZ&amp;quot;  &amp;quot;http://example.com/index.php&amp;quot;&lt;br /&gt;
User-Agent, filter code (hide), proxy&lt;br /&gt;
 wfuzz -c -w user-agents.txt -p 127.0.0.1:8080:HTTP --ss &amp;quot;Welcome &amp;quot; -H &amp;quot;User-Agent: FUZZ&amp;quot;  &amp;quot;http://example.com/index.php&amp;quot;&lt;br /&gt;
Host&lt;br /&gt;
 wfuzz -c -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-20000.txt --hc 400,404,403 -H &amp;quot;Host: FUZZ.example.com&amp;quot; -u &lt;br /&gt;
http://example.com -t 100&lt;br /&gt;
&lt;br /&gt;
===HTTP Verbs (methods) bruteforce===&lt;br /&gt;
Using file&lt;br /&gt;
 wfuzz -c -w methods.txt -p 127.0.0.1:8080:HTTP --sc 200 -X FUZZ &amp;quot;http://example.com/index.php&amp;quot;&lt;br /&gt;
Using inline list&lt;br /&gt;
 $ wfuzz -z list,GET-HEAD-POST-TRACE-OPTIONS -X FUZZ http://testphp.vulnweb.com/&lt;br /&gt;
&lt;br /&gt;
===Directory &amp;amp; Files Bruteforce===&lt;br /&gt;
#Filter by whitelisting codes&lt;br /&gt;
 wfuzz -c -z file,/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt --sc 200,202,204,301,302,307,403 http://example.com/uploads/FUZZ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>