Twitter
Facebook
LinkedIn
Reddit
Email
WhatsApp
Post Views 346
Basic Commands Command Description ffuf -u <URL/FUZZ> -w <wordlist>
Basic directory/file brute-forcing ffuf -u <URL/FUZZ> -w <wordlist> -e <ext>
Brute-force directories/files with specific extensions ffuf -u http://FUZZ.example.com/ -w <wordlist>
Brute-force subdomains ffuf -u <URL>?FUZZ=value -w <wordlist>
Brute-force parameters in a query string ffuf -u <URL/FUZZ> -w <wordlist> -o <output>
Save the scan output to a file ffuf -w <wordlist> -u <URL/FUZZ> -X POST
Use POST method for requests
Directory and File Enumeration Command Description ffuf -u http://example.com/FUZZ -w /path/to/wordlist.txt
Basic directory brute-force ffuf -u http://example.com/FUZZ -w /path/to/wordlist.txt -e .php,.html,.txt
Brute-force files with specific extensions ffuf -u http://example.com/FUZZ -w /path/to/wordlist.txt -t <num>
Set the number of threads (default is 40) ffuf -u http://example.com/FUZZ -w /path/to/wordlist.txt -recursion
Recursive fuzzing of directories ffuf -u http://example.com/FUZZ -w /path/to/wordlist.txt -c
Display colored output
Example Usage: ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -t 50
-t : Specify the number of threads (in this example, 50).Parameter and GET Request Fuzzing Command Description ffuf -u http://example.com/index.php?FUZZ=value -w /path/to/wordlist.txt
Brute-force parameters in the URL ffuf -u http://example.com/index.php?id=FUZZ -w /path/to/wordlist.txt
Brute-force parameter values
Example Usage: ffuf -u http://example.com/index.php?FUZZ=test -w /usr/share/wordlists/dirb/common.txt
Subdomain Enumeration Command Description ffuf -u http://FUZZ.example.com/ -w /path/to/wordlist.txt
Brute-force subdomains ffuf -u http://FUZZ.example.com/ -w /path/to/wordlist.txt -t <num>
Set the number of threads for subdomain brute-force
Example Usage: ffuf -u http://FUZZ.example.com/ -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -t 100
Filter Results FFuF allows filtering by status codes, size, and word count for more targeted fuzzing.
Command Description ffuf -u <URL/FUZZ> -w <wordlist> -fc <codes>
Filter by HTTP status codes (e.g., 404, 500) ffuf -u <URL/FUZZ> -w <wordlist> -fs <size>
Filter by response size ffuf -u <URL/FUZZ> -w <wordlist> -fw <words>
Filter by number of words in response
Example Usage: ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -fc 404
-fc 404 : Filter out responses with a 404 status code.Advanced Options Command Description ffuf -u <URL/FUZZ> -w <wordlist> -H 'Header: value'
Add custom HTTP headers ffuf -u <URL/FUZZ> -w <wordlist> -X POST -d 'data'
Send POST requests with a data payload ffuf -u <URL/FUZZ> -w <wordlist> --delay <seconds>
Set delay between requests (in seconds) ffuf -u <URL/FUZZ> -w <wordlist> -mc <code>
Match specific HTTP status codes
Custom HTTP Header Example: ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -H "Authorization: Bearer <token>"
POST Request Fuzzing Example: ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -X POST -d "username=FUZZ&password=pass123"
Wordlists Common Wordlists :
/usr/share/wordlists/dirb/common.txt
/usr/share/seclists/Discovery/Web-Content/common.txt
/usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt
Saving Output You can save the results to a file for later review.
Command Description ffuf -u <URL/FUZZ> -w <wordlist> -o <output file> -of <format>
Save output to a file (e.g., in JSON format)
Example Usage: ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt -o results.json -of json
-o : Output the results to a file.
-of json : Save the output in JSON format.Example Scans Basic Directory Bruteforce : ffuf -u http://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txt
Subdomain Bruteforce : ffuf -u http://FUZZ.example.com/ -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt
POST Request Parameter Fuzzing : ffuf -u http://example.com/login.php -w /usr/share/wordlists/dirb/common.txt -X POST -d "username=FUZZ&password=123456"
Leave a Reply