Wfuzz is a Python based flexible web application brute forcer which supports various methods and techniques to expose web application vulnerabilities. This allows you to audit parameters, authentication, forms with brute-forcing GET and POST parameters, discover unlinked resources such as directories/files, headers and so on.
A brute force attack is a method to determine an unknown value by using an automated process to try a large number of possible values.
Wfuzz was created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the keyword FUZZ by the value of a given payload. A payload in Wfuzz is a source of input data.
This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex brute force attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
You can use Wfuzz to find several type of vulnerabilities:
- Predictable credentials
- Predictable sessions identifier (session idʼs)
- Predictable resource location (directories and files)
- Path traversals
- Cross site scripting
- Authentication flaws
- Insecure direct object references
Wfuzz was created to facilitate the task in web applications assessments, a tool by pen-testers for pen-testers.
- Recursion (when doing directory discovery)
- Post data brute-forcing
- Header brute-forcing
- Output to HTML (easy for just clicking the links and checking the page, even with postdata!)
- Colored output
- Hide results by return code, word numbers, line numbers, etc.
- Url encoding
- Proxy support
- All parameter fuzzing
You can download Wfuzz here:
Or read more here.