recon_05 (wfuzz)
View the exercise here: PentesterLab: Recon 05
OBJECTIVE
For this challenge, your goal is to find a directory that is not directly accessible.
FUZZING DIRECTORIES
When accessing a new webserver, it often pays off to brute force directories. To do this, you can use many tools like patator, FFUF, or WFuzz (amongst many others).
SOLUTION
You can use wfuzz
, ffuf
, or patator
.
For wfuzz: https://wfuzz.readthedocs.io/en/latest/
In Kali machine:
We'll change the directory to /usr/bin
and then check wfuzz
.
cd /usr/bin
./wfuzz

To discover wordlists to use for fuzzing:
ls /usr/share/wfuzz/wordlist/general

We'll use common.txt
and enter it in wfuzz.
wfuzz -c -z file,wordlist/general/common.txt --sc 200 http://hackycorp.com/FUZZ/

Notes:
--
take note of the double dash, this is often the cause of errorsadd slash
/
at the end of the URL to get exactly 200 rather than 301 responses
From the wfuzz results, we use curl to the directories we've found to get the flag.
curl http://hackycorp.com/admin/
curl http://hackycorp.com/images/
curl http://hackycorp.com/startpage/

We'll see the flag in http://hackycorp.com/startpage/
Last updated
Was this helpful?