2018-11-12 11:49:57 +00:00
```
2019-06-26 19:44:52 +00:00
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
2018-11-12 11:49:57 +00:00
```
2018-11-08 09:26:32 +00:00
# ffuf - Fuzz Faster U Fool
2019-06-26 19:44:52 +00:00
A fast web fuzzer written in Go.
2018-11-09 13:49:54 +00:00
2019-12-30 11:07:28 +00:00
## Installation
2018-11-09 13:49:54 +00:00
2019-12-30 11:07:28 +00:00
- [Download ](https://github.com/ffuf/ffuf/releases/latest ) a prebuilt binary from [releases page ](https://github.com/ffuf/ffuf/releases/latest ), unpack and run!
or
2020-08-30 10:40:25 +00:00
- If you have recent go compiler installed: `go get github.com/ffuf/ffuf`
or
- git clone https://github.com/ffuf/ffuf ; cd ffuf ; go build
2018-11-09 13:49:54 +00:00
2019-12-30 11:07:28 +00:00
The only dependency of ffuf is Go 1.11. No dependencies outside of Go standard library are needed.
2018-11-09 13:49:54 +00:00
2019-12-30 11:07:28 +00:00
## Example usage
2018-11-09 13:49:54 +00:00
### Typical directory discovery
2018-11-12 10:53:14 +00:00
[![asciicast ](https://asciinema.org/a/211350.png )](https://asciinema.org/a/211350)
2018-11-09 13:49:54 +00:00
By using the FUZZ keyword at the end of URL (`-u`):
```
ffuf -w /path/to/wordlist -u https://target/FUZZ
```
### Virtual host discovery (without DNS records)
2018-11-12 10:53:14 +00:00
[![asciicast ](https://asciinema.org/a/211360.png )](https://asciinema.org/a/211360)
2018-11-09 13:49:54 +00:00
Assuming that the default virtualhost response size is 4242 bytes, we can filter out all the responses of that size (`-fs 4242`)while fuzzing the Host - header:
```
ffuf -w /path/to/vhost/wordlist -u https://target -H "Host: FUZZ" -fs 4242
```
### GET parameter fuzzing
GET parameter name fuzzing is very similar to directory discovery, and works by defining the `FUZZ` keyword as a part of the URL. This also assumes an response size of 4242 bytes for invalid GET parameter name.
```
ffuf -w /path/to/paramnames.txt -u https://target/script.php?FUZZ=test_value -fs 4242
```
If the parameter name is known, the values can be fuzzed the same way. This example assumes a wrong parameter value returning HTTP response code 401.
```
ffuf -w /path/to/values.txt -u https://target/script.php?valid_name=FUZZ -fc 401
```
### POST data fuzzing
This is a very straightforward operation, again by using the `FUZZ` keyword. This example is fuzzing only part of the POST request. We're again filtering out the 401 responses.
```
2019-12-08 11:48:53 +00:00
ffuf -w /path/to/postdata.txt -X POST -d "username=admin\&password=FUZZ" -u https://target/login.php -fc 401
2018-11-09 13:49:54 +00:00
```
2018-11-08 09:26:32 +00:00
2020-02-27 13:19:07 +00:00
### Maximum execution time
If you don't want ffuf to run indefinitely, you can use the `-maxtime` . This stops __the entire__ process after a given time (in seconds).
```
ffuf -w /path/to/wordlist -u https://target/FUZZ -maxtime 60
```
When working with recursion, you can control the maxtime __per job__ using `-maxtime-job` . This will stop the current job after a given time (in seconds) and continue with the next one. New jobs are created when the recursion functionality detects a subdirectory.
```
ffuf -w /path/to/wordlist -u https://target/FUZZ -maxtime-job 60 -recursion -recursion-depth 2
```
It is also possible to combine both flags limiting the per job maximum execution time as well as the overall execution time. If you do not use recursion then both flags behave equally.
2019-06-16 21:42:42 +00:00
### Using external mutator to produce test cases
For this example, we'll fuzz JSON data that's sent over POST. [Radamsa ](https://gitlab.com/akihe/radamsa ) is used as the mutator.
When `--input-cmd` is used, ffuf will display matches as their position. This same position value will be available for the callee as an environment variable `$FFUF_NUM` . We'll use this position value as the seed for the mutator. Files example1.txt and example2.txt contain valid JSON payloads. We are matching all the responses, but filtering out response code `400 - Bad request` :
```
ffuf --input-cmd 'radamsa --seed $FFUF_NUM example1.txt example2.txt' -H "Content-Type: application/json" -X POST -u https://ffuf.io.fi/ -mc all -fc 400
```
It of course isn't very efficient to call the mutator for each payload, so we can also pre-generate the payloads, still using [Radamsa ](https://gitlab.com/akihe/radamsa ) as an example:
```
# Generate 1000 example payloads
radamsa -n 1000 -o %n.txt example1.txt example2.txt
# This results into files 1.txt ... 1000.txt
# Now we can just read the payload data in a loop from file for ffuf
ffuf --input-cmd 'cat $FFUF_NUM.txt' -H "Content-Type: application/json" -X POST -u https://ffuf.io.fi/ -mc all -fc 400
```
2018-11-08 09:26:32 +00:00
## Usage
2018-11-09 13:49:54 +00:00
To define the test case for ffuf, use the keyword `FUZZ` anywhere in the URL (`-u`), headers (`-H`), or POST data (`-d`).
2019-06-16 21:42:42 +00:00
2018-11-08 09:26:32 +00:00
```
2020-08-30 10:40:25 +00:00
Fuzz Faster U Fool - v1.2.0-git
2020-01-29 22:28:28 +00:00
HTTP OPTIONS:
-H Header `"Name: Value"` , separated by colon. Multiple -H flags are accepted.
-X HTTP method to use (default: GET)
-b Cookie data `"NAME1=VALUE1; NAME2=VALUE2"` for copy as curl functionality.
-d POST data
2020-08-30 10:40:25 +00:00
-ignore-body Do not fetch the response content. (default: false)
2020-01-29 22:28:28 +00:00
-r Follow redirects (default: false)
-recursion Scan recursively. Only FUZZ keyword is supported, and URL (-u) has to end in it. (default: false)
-recursion-depth Maximum recursion depth. (default: 0)
-replay-proxy Replay matched requests using this proxy.
-timeout HTTP request timeout in seconds. (default: 10)
-u Target URL
-x HTTP Proxy URL
GENERAL OPTIONS:
-V Show version information. (default: false)
-ac Automatically calibrate filtering options (default: false)
-acc Custom auto-calibration string. Can be used multiple times. Implies -ac
-c Colorize output. (default: false)
2020-08-30 10:40:25 +00:00
-maxtime Maximum running time in seconds for entire process. (default: 0)
2020-02-27 13:19:07 +00:00
-maxtime-job Maximum running time in seconds per job. (default: 0)
2020-01-29 22:28:28 +00:00
-p Seconds of `delay` between requests, or a range of random delay. For example "0.1" or "0.1-2.0"
2020-08-30 10:51:41 +00:00
-rate Rate of requests per second (default: 0)
2020-01-29 22:28:28 +00:00
-s Do not print additional information (silent mode) (default: false)
-sa Stop on all error cases. Implies -sf and -se. (default: false)
-se Stop on spurious errors (default: false)
-sf Stop when > 95% of responses return 403 Forbidden (default: false)
-t Number of concurrent threads. (default: 40)
-v Verbose output, printing full URL and redirect location (if any) with the results. (default: false)
MATCHER OPTIONS:
-mc Match HTTP status codes, or "all" for everything. (default: 200,204,301,302,307,401,403)
-ml Match amount of lines in response
-mr Match regexp
-ms Match HTTP response size
-mw Match amount of words in response
FILTER OPTIONS:
-fc Filter HTTP status codes from response. Comma separated list of codes and ranges
-fl Filter by amount of lines in response. Comma separated list of line counts and ranges
-fr Filter regexp
-fs Filter HTTP response size. Comma separated list of sizes and ranges
-fw Filter by amount of words in response. Comma separated list of word counts and ranges
INPUT OPTIONS:
-D DirSearch wordlist compatibility mode. Used in conjunction with -e flag. (default: false)
-e Comma separated list of extensions. Extends FUZZ keyword.
-ic Ignore wordlist comments (default: false)
-input-cmd Command producing the input. --input-num is required when using this input method. Overrides -w.
-input-num Number of inputs to test. Used in conjunction with --input-cmd. (default: 100)
-mode Multi-wordlist operation mode. Available modes: clusterbomb, pitchfork (default: clusterbomb)
-request File containing the raw http request
-request-proto Protocol to use along with raw request (default: https)
-w Wordlist file path and (optional) keyword separated by colon. eg. '/path/to/wordlist:KEYWORD'
OUTPUT OPTIONS:
-debug-log Write all of the internal logging to the specified file.
-o Write output to file
-od Directory path to store matched results to.
2020-08-30 10:40:25 +00:00
-of Output file format. Available formats: json, ejson, html, md, csv, ecsv (or, 'all' for all formats) (default: json)
2020-01-29 22:28:28 +00:00
EXAMPLE USAGE:
Fuzz file paths from wordlist.txt, match all responses but filter out those with content-size 42.
Colored, verbose output.
ffuf -w wordlist.txt -u https://example.org/FUZZ -mc all -fs 42 -c -v
Fuzz Host-header, match HTTP 200 responses.
ffuf -w hosts.txt -u https://example.org/ -H "Host: FUZZ" -mc 200
Fuzz POST JSON data. Match all responses not containing text "error".
ffuf -w entries.txt -u https://example.org/ -X POST -H "Content-Type: application/json" \
-d '{"name": "FUZZ", "anotherkey": "anothervalue"}' -fr "error"
Fuzz multiple locations. Match only responses reflecting the value of "VAL" keyword. Colored.
ffuf -w params.txt:PARAM -w values.txt:VAL -u https://example.org/?PARAM=VAL -mr "VAL" -c
More information and examples: https://github.com/ffuf/ffuf
2020-08-30 10:40:25 +00:00
2020-01-29 22:28:28 +00:00
```
2018-11-08 09:26:32 +00:00
2020-02-02 15:06:43 +00:00
## Helper scripts and advanced payloads
See [ffuf-scripts ](https://github.com/ffuf/ffuf-scripts ) repository for helper scripts and payload generators
for different workflows and usage scenarios.
2019-12-30 11:07:28 +00:00
## License
2018-11-14 22:18:43 +00:00
2019-12-30 11:07:28 +00:00
ffuf is released under MIT license. See [LICENSE ](https://github.com/ffuf/ffuf/blob/master/LICENSE ).