FFUF Beginner Part One

protonsec
4 min readOct 3, 2022

--

ffuf beginner level part one hacking tool
ffuf beginner level part one hacking tool

fuff is a must have tool for Ethical Hackers and Bug Bounty Hunters. As the name suggest in this blog we are going to see the installation and usage of ffuf in our terminal so without any further do let’s hack.

Installation

If you want you can visit this youtube video for steps in Hindi

And in English

First of all go to the official page of ffuf on github and copy the git url or copy https://github.com/ffuf/ffuf.git . Now move the your terminal

ffuf@tool:~$ git clone https://github.com/ffuf/ffuf.git
Cloning into 'ffuf'...
remote: Enumerating objects: 1792, done.
remote: Counting objects: 100% (558/558), done.
remote: Compressing objects: 100% (264/264), done.
remote: Total 1792 (delta 353), reused 477 (delta 294), pack-reused 1234
Receiving objects: 100% (1792/1792), 715.91 KiB | 1.16 MiB/s, done.
Resolving deltas: 100% (1165/1165), done.

So far we have successfully clone the ffuf git from the github. Go to the ffuf directory and start installing ffuf but before that make sure you have go installed in your system.

ffuf@tool:~$ cd ffuf
ffuf@tool:/ffuf~$ go get
ffuf@tool:/ffuf~$ go build

cd ffuf will move you to ffuf directory

go get will initialise installing ffuf

go build will finally build the ffuf to be usable

Finally ffuf is installed in your system. Type ffuf in your terminal to see whether it’s installed successfully or not.

ffuf@tool:/ffuf~$ ffuf
Encountered error(s): 2 errors occurred.
* -u flag or -request flag is required
* Either -w or --input-cmd flag is required
Fuzz Faster U Fool - v1.5.0 Kali Exclusive <3HTTP OPTIONS:
-H Header `"Name: Value"`, separated by colon. Multiple -H flags are accepted.
-X HTTP method to use
-b Cookie data `"NAME1=VALUE1; NAME2=VALUE2"` for copy as curl functionality.
-d POST data
-http2 Use HTTP2 protocol (default: false)
-ignore-body Do not fetch the response content. (default: false)
-r Follow redirects (default: false)
-recursion Scan recursively. Only FUZZ keyword is supported, and URL (-u) has to end in it. (default: false)
-recursion-depth Maximum recursion depth. (default: 0)
-recursion-strategy Recursion strategy: "default" for a redirect based, and "greedy" to recurse on all matches (default: default)
-replay-proxy Replay matched requests using this proxy.
-sni Target TLS SNI, does not support FUZZ keyword
-timeout HTTP request timeout in seconds. (default: 10)
-u Target URL
-x Proxy URL (SOCKS5 or HTTP). For example: http://127.0.0.1:8080 or socks5://127.0.0.1:8080
...
...

Here is the most basic syntax for using ffuf

ffuf -w wordlist.txt -u https://website.com/FUZZ

-w is used to specify wordlist you are going to use

-u specifies the url you will be fuzzing

FUZZ is the position where all the payloads will be tried

Usage

Now we are going to use ffuf on http://hackycorp.com/ which is a free website to test our hacking skills.

ffuf@tool:/ffuf~$ ffuf -w dicc.txt -u https://hackycorp.com/FUZZ

The wordlist dicc.txt can be found here

Now the results are

ffuf@tool:/ffuf~$ ffuf -w dicc.txt -u https://hackycorp.com/FUZZ

/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v1.5.0 Kali Exclusive <3
________________________________________________
:: Method : GET
:: URL : https://hackycorp.com/FUZZ
:: Wordlist : FUZZ: /home/ffuf/dicc.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
.well-known/security.txt [Status: 200, Size: 156, Words: 24, Lines: 4, Duration: 204ms]
admin [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 204ms]
images [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 204ms]
index.html [Status: 200, Size: 16011, Words: 5888, Lines: 278, Duration: 205ms]
robots.txt [Status: 200, Size: 121, Words: 14, Lines: 7, Duration: 218ms]
startpage [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 216ms]
:: Progress: [4713/4713] :: Job [1/1] :: 192 req/sec :: Duration: [0:00:29] :: Errors: 0 ::

As you can see in the results we have the directories

.well-known/security.txt
admin
images
index.html
robots.txt
startpage

If you only want results with 200 status code the use the following

ffuf -w dicc.txt -u https://hackycorp.com/FUZZ -mc 200

That’s all for the first writeup about ffuf in which we have learned about simple installation of ffuf and some basic usage in the next part we will see some more usage of it and in the final part we will see the advanced usage of ffuf and use it in most comprehensive way until then stay tuned.

Let’s get connected

Twitter: proton_sec
GitHub: proton-sec
LinkedIn: protonsec

If you want to appreciate and support my work here you go…

Thanks for Reading!!!

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response