Provided by: wfuzz_2.4.5-1_all
NAME
wfuzz - a web application bruteforcer
SYNOPSIS
wfuzz [options] -z payload,params <url>
OPTIONS
-h Print information about available arguments. --help Advanced help. --version Wfuzz version details -e <type> List of available encoders/payloads/iterators/printers/scripts --recipe <filename> Reads options from a recipe --dump-recipe <filename> Prints current options as a recipe --oF <filename> Saves fuzz results to a file. These can be consumed later using the wfuzz payload. -c Output with colors -v Verbose information. -f filename,printer Store results in the output file using the specified printer (raw printer if omitted). -o printer Format output using the specified printer. --interact (beta) If selected, all key presses are captured. This allows you to interact with the program. --dry-run Print the results of applying the requests without actually making any HTTP request. --prev Print the previous HTTP requests (only when using payloads generating fuzzresults) -p addr Use Proxy in format ip:port:type. Repeat option for using various proxies. Where type could be SOCKS4, SOCKS5 or HTTP if omitted. -t N Specify the number of concurrent connections (10 default) -s N Specify time delay between requests (0 default) -R depth Recursive path discovery being depth the maximum recursion level. -L, --follow Follow HTTP redirections -Z Scan mode (Connection errors will be ignored). --req-delay N Sets the maximum time in seconds the request is allowed to take (CURLOPT_TIMEOUT). Default 90. --conn-delay N Sets the maximum time in seconds the connection phase to the server to take (CURLOPT_CONNECTTIMEOUT). Default 90. -A Alias for --script=default -v -c --script= Equivalent to --script=default --script=<plugins> Runs script's scan. <plugins> is a comma separated list of plugin-files or plugin-categories --script-help=<plugins> Show help about scripts. --script-args n1=v1,... Provide arguments to scripts. ie. --script-args grep.regex="<A href=\"(.*?)\">" -u url Specify a URL for the request. -m iterator Specify an iterator for combining payloads (product by default) -z payload Specify a payload for each FUZZ keyword used in the form of type,parameters,encoder. A list of encoders can be used, ie. md5-sha1. Encoders can be chained, ie. md5@sha1. Encoders category can be used. ie. url. Use help as a payload to show payload plugin's details (you can filter using --slice) --zP <params> Arguments for the specified payload (it must be preceded by -z or -w). --slice <filter> Filter payload's elements using the specified expression. It must be preceded by -z. -w wordlist Specify a wordlist file (alias for -z file,wordlist). -V alltype All parameters bruteforcing (allvars and allpost). No need for FUZZ keyword. -X method Specify an HTTP method for the request, ie. HEAD or FUZZ -b cookie Specify a cookie for the requests. Repeat option for various cookies. -d postdata Use post data (ex: "id=FUZZ&catalogue=1") -H headers Use headers (ex:"Host:www.mysite.com,Cookie:id=1312321&user=FUZZ"). Repeat option for various headers. --basic/ntlm/digest auth in format "user:pass" or "FUZZ:FUZZ" or "domain\FUZ2Z:FUZZ" --hc/hl/hw/hh N[,N]+ Hide responses with the specified code/lines/words/chars (Use BBB for taking values from baseline) --sc/sl/sw/sh N[,N]+ Show responses with the specified code/lines/words/chars (Use BBB for taking values from baseline) --ss/hs regex Show/Hide responses with the specified regex within the content --filter <filter> Filter responses using the specified expression (Use BBB for taking values from baseline) It should be composed of: c,l,w,h/and,or/=,<,>,!=,<=,>= Keyword: FUZZ, ..., FUZnZ wherever you put these keywords wfuzz will replace them with the values of the specified payload. Baseline: FUZZ{baseline_value} FUZZ will be replaced by baseline_value. It will be the first request performed and could be used as a base for filtering. --prefilter <filter> Filter items before fuzzing using the specified expression.
EXAMPLES
wfuzz -c -z file,users.txt -z file,pass.txt --sc 200 http://www.site.com/log.asp?user=FUZZ&pass=FUZ2Z wfuzz -c -z range,1-10 --hc=BBB http://www.site.com/FUZZ{something not there} wfuzz --script=robots -z list,robots.txt http://www.webscantest.com/FUZZ More examples are available in the README..