← Prompts
Task / Understand System Prompts Collection

ffuf #web #hacking #fuzzing

#ffuf #web #hacking #fuzzing [source](https://academy.hackthebox.com/module/54/section/484) Welcome to the `Attacking Web Applications with Ffuf` module! There are many tools and methods to utilize

#ffuf #web #hacking #fuzzing 
[source](https://academy.hackthebox.com/module/54/section/484)

Welcome to the `Attacking Web Applications with Ffuf` module!

There are many tools and methods to utilize for directory and parameter fuzzing/brute-forcing. In this module we will mainly focus on the [ffuf](https://github.com/ffuf/ffuf) tool for web fuzzing, as it is one of the most common and reliable tools available for web fuzzing.

The following topics will be discussed:

- Fuzzing for directories
- Fuzzing for files and extensions
- Identifying hidden vhosts
- Fuzzing for PHP parameters
- Fuzzing for parameter values

Tools such as `ffuf` provide us with a handy automated way to fuzz the web application's individual components or a web page. This means, for example, that we use a list that is used to send requests to the webserver if the page with the name from our list exists on the webserver. If we get a response code 200, then we know that this page exists on the webserver, and we can look at it manually.#web #fuzzing #hacking 
[source](https://academy.hackthebox.com/module/54/section/496)

---

We will start by learning the basics of using `ffuf` to fuzz websites for directories. We run the exercise in the question below, and visit the URL it gives us, and we see the following website:

   

![](https://academy.hackthebox.com/storage/modules/54/web_fnb_main_site.jpg)

Sign in to view the full prompt.

Sign In

Classification

Task Immediate work request to complete
Task Understand
Explain or analyze
Scope Global
All AI interactions
Manual Manually placed / Persistent