`

5

VULNERABILIT Y SC A NN IN G A N D

FU ZZIN G

In Chapter 4, we identified hosts on a network and a

couple of running services, like HTTP, FTP, and SSH.

Each of these protocols has its own set of tests we could

perform. In this chapter, well use specialized tools on the

discovered services to find out as much as we can about

them.

In the process, youll use bash to run security testing tools, parse

their output, and write custom scripts to scale security testing across

many URLs. Youll fuzz with tools such as ffuf and wfuzz, write

custom security checks using the Nuclei templating system, extract

personally identifiable information from the output of tools, and

write your own quick and dirty vulnerability scanners.

Black Hat Bash (Early Access) © 2023 by Dolev Farhi and Nick Aleks