Afuzz:一款功能强大的自动化Web路径模糊测试工具

关于Afuzz

Afuzz是一款功能强大的自动化Web路径模糊测试工具,该工具专为Web安全专家和漏洞奖励Hunter设计,可以帮助我们以自动化的形式扫描和收集目标Web应用程序中的页面、语言和相关统计分析等数据。

功能介绍

1、Afuzz可以通过自动化的形式检测目标Web应用程序所使用的开发语言;

2、使用黑名单过滤无效页面;

3、使用白名单寻找漏洞奖励Hunter感兴趣的页面内容;

4、过滤页面中的随机内容;

5、以多种方式判断404错误页面;

6、扫描完成后执行统计数据分析,并生成最终的结果;

7、支持HTTP2;

工具安装

由于该工具基于Python开发,因此我们首先需要在本地设备上安装并配置好Python环境。接下来,广大研究人员可以直接使用下列命令将该项目源码克隆至本地:

git clone https://github.com/rapiddns/Afuzz.git

然后切换到项目目录中,使用pip工具和项目提供的requirements.txt文件安装该工具所需的其他依赖组件:

cd Afuzzpip install -r requirements.txt

依赖组件安装完成后,执行下列安装脚本即可:

python setup.py install

除此之外,我们还可以直接使用pip工具安装Afuzz:

pip install afuzz

工具选项

参数解释

-h, --help             显示工具帮助信息和退出-u URL, --url URL      设置目标URL-o OUTPUT, --output OUTPUT输出文件路径-e EXTENSIONS, --extensions EXTENSIONS扩展列表,逗号分隔 (例如: php,aspx,jsp)-t THREAD, --thread THREAD线程数量-d DEPTH, --depth DEPTH最大递归深度-w WORDLIST, --wordlist WORDLIST字典文件路径-f, --fullpath           完整路径-p PROXY, --proxy PROXY代理, (例如:http://127.0.0.1:8080)

工具运行

使用命令

afuzz -u https://target
afuzz -e php,html,js,json -u https://target
afuzz -e php,html,js -u https://target -d 3

多线程使用

afuzz -e aspx,jsp,php,htm,js,bak,zip,txt,xml -u https://target -t 50

工具运行样例

afuzz -u http://testphp.vulnweb.com -t 30

扫描结果

数据表

+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+|                                                                                    http://testphp.vulnweb.com/                                                                                    |+-----------------------------+---------------------+--------+-----------------------------------+-----------------------+--------+--------------------------+-------+-------+-----------+----------+|            target           |         path        | status |              redirect             |         title         | length |       content-type       | lines | words |    type   |   mark   |+-----------------------------+---------------------+--------+-----------------------------------+-----------------------+--------+--------------------------+-------+-------+-----------+----------+| http://testphp.vulnweb.com/ | .idea/workspace.xml |  200   |                                   |                       | 12437  |         text/xml         |  217  |  774  |   check   |          || http://testphp.vulnweb.com/ |        admin        |  301   | http://testphp.vulnweb.com/admin/ | 301 Moved Permanently |  169   |        text/html         |   8   |   11  |   folder  |   30x    || http://testphp.vulnweb.com/ |      login.php      |  200   |                                   |       login page      |  5009  |        text/html         |  120  |  432  |   check   |          || http://testphp.vulnweb.com/ |     .idea/.name     |  200   |                                   |                       |   6    | application/octet-stream |   1   |   1   |   check   |          || http://testphp.vulnweb.com/ |    .idea/vcs.xml    |  200   |                                   |                       |  173   |         text/xml         |   8   |   13  |   check   |          || http://testphp.vulnweb.com/ |        .idea/       |  200   |                                   |    Index of /.idea/   |  937   |        text/html         |   14  |   46  | whitelist | index of || http://testphp.vulnweb.com/ |       cgi-bin/      |  403   |                                   |     403 Forbidden     |  276   |        text/html         |   10  |   28  |   folder  |   403    || http://testphp.vulnweb.com/ | .idea/encodings.xml |  200   |                                   |                       |  171   |         text/xml         |   6   |   11  |   check   |          || http://testphp.vulnweb.com/ |      search.php     |  200   |                                   |         search        |  4218  |        text/html         |  104  |  364  |   check   |          || http://testphp.vulnweb.com/ |     product.php     |  200   |                                   |    picture details    |  4576  |        text/html         |  111  |  377  |   check   |          || http://testphp.vulnweb.com/ |        admin/       |  200   |                                   |    Index of /admin/   |  248   |        text/html         |   8   |   16  | whitelist | index of || http://testphp.vulnweb.com/ |        .idea        |  301   | http://testphp.vulnweb.com/.idea/ | 301 Moved Permanently |  169   |        text/html         |   8   |   11  |   folder  |   30x    |+-----------------------------+---------------------+--------+-----------------------------------+-----------------------+--------+--------------------------+-------+-------+-----------+----------+```

JSON格式数据

{"result": [{"target": "http://testphp.vulnweb.com/","path": ".idea/workspace.xml","status": 200,"redirect": "","title": "","length": 12437,"content_type": "text/xml","lines": 217,"words": 774,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea/workspace.xml"},{"target": "http://testphp.vulnweb.com/","path": "admin","status": 301,"redirect": "http://testphp.vulnweb.com/admin/","title": "301 Moved Permanently","length": 169,"content_type": "text/html","lines": 8,"words": 11,"type": "folder","mark": "30x","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/admin"},{"target": "http://testphp.vulnweb.com/","path": "login.php","status": 200,"redirect": "","title": "login page","length": 5009,"content_type": "text/html","lines": 120,"words": 432,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/login.php"},{"target": "http://testphp.vulnweb.com/","path": ".idea/.name","status": 200,"redirect": "","title": "","length": 6,"content_type": "application/octet-stream","lines": 1,"words": 1,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea/.name"},{"target": "http://testphp.vulnweb.com/","path": ".idea/vcs.xml","status": 200,"redirect": "","title": "","length": 173,"content_type": "text/xml","lines": 8,"words": 13,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea/vcs.xml"},{"target": "http://testphp.vulnweb.com/","path": ".idea/","status": 200,"redirect": "","title": "Index of /.idea/","length": 937,"content_type": "text/html","lines": 14,"words": 46,"type": "whitelist","mark": "index of","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea/"},{"target": "http://testphp.vulnweb.com/","path": "cgi-bin/","status": 403,"redirect": "","title": "403 Forbidden","length": 276,"content_type": "text/html","lines": 10,"words": 28,"type": "folder","mark": "403","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/cgi-bin/"},{"target": "http://testphp.vulnweb.com/","path": ".idea/encodings.xml","status": 200,"redirect": "","title": "","length": 171,"content_type": "text/xml","lines": 6,"words": 11,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea/encodings.xml"},{"target": "http://testphp.vulnweb.com/","path": "search.php","status": 200,"redirect": "","title": "search","length": 4218,"content_type": "text/html","lines": 104,"words": 364,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/search.php"},{"target": "http://testphp.vulnweb.com/","path": "product.php","status": 200,"redirect": "","title": "picture details","length": 4576,"content_type": "text/html","lines": 111,"words": 377,"type": "check","mark": "","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/product.php"},{"target": "http://testphp.vulnweb.com/","path": "admin/","status": 200,"redirect": "","title": "Index of /admin/","length": 248,"content_type": "text/html","lines": 8,"words": 16,"type": "whitelist","mark": "index of","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/admin/"},{"target": "http://testphp.vulnweb.com/","path": ".idea","status": 301,"redirect": "http://testphp.vulnweb.com/.idea/","title": "301 Moved Permanently","length": 169,"content_type": "text/html","lines": 8,"words": 11,"type": "folder","mark": "30x","subdomain": "testphp.vulnweb.com","depth": 0,"url": "http://testphp.vulnweb.com/.idea"}],"total": 12,"target": "http://testphp.vulnweb.com/"}

字典(重要)

1、Afuzz所使用的字典是一个text文本文件,每一个路径单独每一行;

2、关于后缀,Afuzz会使用-e参数提供的后缀替换%EXT%关键词,如果没设置-e的话,则使用默认值;

3、我们可以基于域名来生成字典,Afuzz可以使用主机替换%subdomain%,使用根域名替换%rootdomain%,使用子域名替换%sub%,使用域名替换%domain%;

使用样例

普通后缀:

index.%EXT%

设置asp和aspx后缀将生成下列字典:

indexindex.aspindex.aspx

主机:

%subdomain%.%ext%%sub%.bak%domain%.zip%rootdomain%.zip

传递https://test-www.hackerone.com和php后缀将生成下列字典:

test-www.hackerone.com.phptest-www.ziptest.zipwww.ziptestwww.ziphackerone.ziphackerone.com.zip

项目地址

Afuzz:【GitHub传送门】

参考链接

https://github.com/xmendez/wfuzz

https://github.com/s0md3v/Arjun

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.hqwc.cn/news/315364.html

如若内容造成侵权/违法违规/事实不符,请联系编程知识网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

Flutter 中使用 ICON

Flutter Icon URL : https://fonts.google.com/icons: 在Flutter中使用 Icon 步骤如下: 导入图标库 在Dart 文件中导入 material.dart 包,该包包含了 Flutter 的图标库。 import package:flutter/material.dart;使用图标组件 …

QT登录功能开发

登录功能 1选择无按钮的dialog 2登录函数 #include <QApplication> #include <QDialog> #include <QFormLayout> #include <QLineEdit> #include <QPushButton> #include <QMessageBox>class LoginDialog : public QDialog { public:Log…

反转链表、链表的中间结点、合并两个有序链表【LeetCode刷题日志】

一、反转链表 给你单链表的头节点 head &#xff0c;请你反转链表&#xff0c;并返回反转后的链表。 力扣&#xff08;LeetCode&#xff09;官网 - 全球极客挚爱的技术成长平台 思路一&#xff1a;翻转单链表指针方向 这里解释一下三个指针的作用&#xff1a; n1&#xff1…

C#核心学习(面向对象)

目录 封装构造函数基本概念&#xff1a;写法&#xff1a;特殊写法注意&#xff1a; 析构函数基本语法 垃圾回收机制&#xff08;GC&#xff0c;Garbage Collector&#xff09;回收算法C# 中内存回收原理自动回收步骤注意 手动回收&#xff1a; 成员属性基本概念基本语法注意&am…

如何使用Node.js快速创建本地HTTP服务器并实现公网访问服务端

&#x1f49d;&#x1f49d;&#x1f49d;欢迎来到我的博客&#xff0c;很高兴能够在这里和您见面&#xff01;希望您在这里可以感受到一份轻松愉快的氛围&#xff0c;不仅可以获得有趣的内容和知识&#xff0c;也可以畅所欲言、分享您的想法和见解。 推荐:kwan 的首页,持续学…

leaflet学习笔记-leaflet-ajax获取数据(五)

前言 地图开发中都会用一些GeoJSON数据进行渲染&#xff0c;这是用就会需要加载GeoJSON数据&#xff0c;这时就可以使用leaflet-ajax进行数据的获取 数据准备 本文通过阿里云的地图选择器&#xff08;DataV.GeoAtlas官网&#xff09;可以找到云南省的GeoJSON数据&#xff0c…

深入了解隧道代理HTTP的协议与技术细节

隧道代理HTTP&#xff0c;作为一种网络通信的桥梁技术&#xff0c;其背后的协议与技术细节承载着网络世界的无尽奥秘。对于技术人员而言&#xff0c;深入了解这些细节&#xff0c;不仅有助于优化网络性能&#xff0c;还能为网络安全提供坚实的保障。 一、隧道代理HTTP的协议基…

exec、execFile、fork、spawn的区别与使用场景

在Node.js中&#xff0c;通过子进程可以实现并行执行任务&#xff0c;处理复杂的操作&#xff0c;以及与外部命令或文件进行交互。Node.js提供了多种子进程创建方法&#xff0c;包括exec、execFile、fork和spawn。本文将对这些方法进行比较&#xff0c;并介绍它们的适用场景和示…

This is probably not a problem with npm.

项目场景&#xff1a; 新创建的vue3项目&#xff0c;根据elementplus官网安装步骤进行按需导入安装&#xff0c;运行项目报错 This is probably not a problem with npm.There is likely additional logging output above. 原因分析&#xff1a; 是elementplus安装版本和自动…

【Java进阶篇】String中 intern 的原理是什么?

String中 intern 的原理 ✔️ 典型解析✔️小思考&#xff08;回顾&#xff09; ✔️字面量✔️intern✔️ intern原理✔️a和1有什么不同✔️答案 ✔️ 典型解析 字符串常量池中的常量有两种来源&#xff1a; 1、 字面量会在编译期先进入到Class常量池&#xff0c;然后再在运行…

系统编程--gcc编译

这里写目录标题 gcc编译四步骤简介注意点参数-I-D 二级目录 一级目录二级目录二级目录二级目录 一级目录二级目录二级目录二级目录 一级目录二级目录二级目录二级目录 一级目录二级目录二级目录二级目录 gcc编译四步骤 简介 以上是gcc编译的四步骤&#xff0c;每个步骤生成对应…

【java爬虫】使用element-plus进行个股详细数据分页展示

前言 前面的文章我们讲述了获取详细个股数据的方法&#xff0c;并且使用echarts对个股的价格走势图进行了展示&#xff0c;本文将编写一个页面&#xff0c;对个股详细数据进行展示。别问涉及到了element-plus中分页的写法&#xff0c;对于这部分知识将会做重点讲解。 首先看一…