binocularsrecon_05 (wfuzz)

View the exercise here: PentesterLab: Recon 05arrow-up-right

OBJECTIVE

For this challenge, your goal is to find a directory that is not directly accessible.

FUZZING DIRECTORIES

When accessing a new webserver, it often pays off to brute force directories. To do this, you can use many tools like patatorarrow-up-right, FFUFarrow-up-right, or WFuzzarrow-up-right (amongst many others).

SOLUTION

You can use wfuzzarrow-up-right, ffufarrow-up-right, or patatorarrow-up-right.

For wfuzz: https://wfuzz.readthedocs.io/en/latest/arrow-up-right

In Kali machine:

We'll change the directory to /usr/bin and then check wfuzz.

cd /usr/bin
./wfuzz

To discover wordlists to use for fuzzing:

We'll use common.txt and enter it in wfuzz.

circle-info

-c to colorize the output

-z to define the payload type for fuzzing

--sc (show codes) In this case, it will only show responses with 200 OK status

--hc (hide codes) hides responses that match the specified HTTP status codes

circle-exclamation

From the wfuzz results, we use curl to the directories we've found to get the flag.

circle-check

Last updated