WFUZZ Brute Forcing
wfuzz -c --hw <word length> -w -d '<post data>' <url>
e.g.
wfuzz -c --hw 36 -w /usr/share/seclists/Passwords/darkweb2017-top1000.txt -d 'username=admin&password=FUZZ&submit=Login' http://10.10.10.86/login
Key
-c
output with colors
-w
wordlist
-d
postdata
FUZZ
tells wfuzz where to fuzz with your wordlist
--hw <word length>
hide words of a certain length from the output
Last updated