`

The output indicates that ffuf has identified that the path

http://172.16.10.10:8081/files/acme-hyper-branding-5.csv returned a

status code of HTTP 200 OK. If you look closely at the output, you

should see that the fuzzer sent 405 requests in less than a second,

which is pretty impressive.

Fuzzing with Wfuzz

Wfuzz is another web fuzzing tool that can do similar things to

ffuf. In fact, ffuf is based on Wfuzz. Let’s use Wfuzz to perform the

same type of word list-based scan (-w), then use its filtering

capabilities to show only files that receive a response status code of

200 OK (--sc 200):

$ wfuzz --sc 200 -w files_wordlist.txt http://172.16.10.10:8081/files/FUZZ

--snip--

Target: http://172.16.10.10:8081/files/FUZZ

Total requests: 405

=====================================================================

ID Response Lines Word Chars Payload

=====================================================================

000000022: 200 8 L 37 W 432 Ch "acme-hyper-branding-5.csv"

Total time: 0

Processed Requests: 405

Filtered Requests: 404

Requests/sec.: 0

Next, lets use the wget command to download this file.

$ wget http://172.16.10.10:8081/files/acme-hyper-branding-5.csv

$ cat acme-hyper-branding-5.csv

no, first_name, last_name, designation, email

1, Jacob, Taylor, Founder, [email protected]

2, Sarah, Lewis, Executive Assistance, [email protected]

3, Nicholas, Young, Influencer, [email protected]

4, Lauren, Scott, Influencer, [email protected]

5, Aaron,Peres, Marketing Lead, [email protected]

6, Melissa, Rogers, Marketing Lead, [email protected]

Weve identified a table of personally identifiable information

(PII), including first and last names, titles, and email addresses. Take

notes of every detail weve managed to extract in this chapter; you

never know when it will come in handy.

Black Hat Bash (Early Access) © 2023 by Dolev Farhi and Nick Aleks