xct's notes
Search…
Tools

Ffuf

Usage

1
# files/direcotires
2
~/tools/ffuf/ffuf -w /home/xct/tools/SecLists/Discovery/Web-Content/raft-large-directories.txt -u http://<ip>/FUZZ
3
# params via get
4
~/tools/ffuf/ffuf -w ./input -u http://<file>?<param>=FUZZ -t <threads>
5
# params via post
6
~/tools/ffuf/ffuf -w ./input -X POST -d "params" -u http://<url> -t <threads>
Copied!

Pure Brute

1
import itertools
2
import string
3
for x in itertools.product(string.ascii_lowercase+string.digits, repeat=4):
4
print(''.join(x))
Copied!
1
python3 fuzz.py | ffuf -w -:BRUTE -u http://10.10.117.205/BRUTE
Copied!

Filters

1
# Exclude
2
-fc(chars), -fr(regex), -fs(string), -fw(words)
3
# Include
4
-mc(chars), -mr(regex), -ms(string), -mw(words)
Copied!

JWT

Before using the tool, make sure to clone a fresh copy of github so it generates new keys & jwks.json files in your current working directory.
1
python3 jwt_tool.py <ey..>
Copied!
If we have access to the private key, we can change the contents of a JWT token interactively like so:
1
python3 jwt_tool.py ey... -T -S rs256
Copied!
The private key should be named jwttool_custom_private_RSA.pem .
1
jwt-cracker <token> [<alphabet>] [<maxLength>]
Copied!

Last modified 1mo ago
Copy link
Contents
Ffuf
JWT