UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: DirBuster - Directory and File Bruteforcing

DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.

---

### Basic Usage Command:
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt


Explanation:
- java -jar dirbuster.jar: Runs the DirBuster Java application.
- -u http://example.com: Specifies the target URL to scan.
- -l /path/to/wordlist.txt: Specifies the path to the wordlist containing potential directory and file names.

---

### Example: Specifying a Custom HTTP Port
java -jar dirbuster.jar -u http://example.com:8080 -l /path/to/wordlist.txt


Explanation:
- http://example.com:8080: Scans a target on a specific port (8080 in this case), useful if the web server is running on a non-standard port.

---

### Example: Brute Forcing with Multiple Threads
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -t 50


Explanation:
- -t 50: Specifies 50 concurrent threads to speed up the brute-forcing process.

---

### Example: Saving Results to a File
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -o /path/to/output.txt


Explanation:
- -o /path/to/output.txt: Saves the scan results to the specified output file (output.txt).

---

### Example: Using a Proxy
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -p 127.0.0.1:8080


Explanation:
- -p 127.0.0.1:8080: Routes traffic through a proxy server (useful for anonymizing the scan or debugging).

---

### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Wfuzz - Web Application Fuzzing Tool

Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.

---

### Basic Usage Command:
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ


Explanation:
- wfuzz: Runs the Wfuzz tool.
- -c: Enables colorized output for easier reading of results.
- -z file,/path/to/wordlist.txt: Specifies a wordlist for fuzzing.
- -u http://example.com/FUZZ: The target URL where FUZZ is the placeholder for words in the wordlist to be tested.

---

### Example: Fuzzing Multiple Parameters
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/page.php?id=FUZZ&user=admin


Explanation:
- id=FUZZ&user=admin: Fuzzes the id parameter while keeping the user parameter fixed.

---

### Example: Fuzzing HTTP Headers
wfuzz -c -z file,/path/to/wordlist.txt -H "X-Secret: FUZZ" http://example.com


Explanation:
- -H "X-Secret: FUZZ": Fuzzes a custom HTTP header (X-Secret) by injecting different words from the wordlist.

---

### Example: Using a Proxy for Traffic
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ --proxy http://127.0.0.1:8080


Explanation:
- --proxy http://127.0.0.1:8080: Routes the fuzzing traffic through a proxy for anonymity or to capture the traffic.

---

### Example: Brute Force Directories
wfuzz -c -z dir,/path/to/dirlist.txt -u http://example.com/FUZZ


Explanation:
- -z dir,/path/to/dirlist.txt: Fuzzes directory names from the specified wordlist to discover hidden directories on the server.

---

### Example: Fuzzing with Recursive Mode
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ -r


Explanation:
- -r: Enables recursive fuzzing, where Wfuzz continues fuzzing on discovered directories or files.

---

### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: OWASP ZAP - Zed Attack Proxy

OWASP ZAP (Zed Attack Proxy) is an open-source web application security scanner. It is used to identify vulnerabilities in web applications through automated scanning and manual testing. ZAP helps detect issues like SQL injection, cross-site scripting (XSS), and more.

---

### Basic Usage Command:
1. Start OWASP ZAP by running the following command (after installing it):
zap.sh


Explanation:
- zap.sh: Launches the OWASP ZAP application from the command line.

---

### Example: Automated Scan Using ZAP's API
zap-cli quick-scan -u http://example.com


Explanation:
- zap-cli quick-scan: Initiates a quick scan of the web application.
- -u http://example.com: Specifies the target URL to be scanned.

---

### Example: Start ZAP in Headless Mode for Automation
zap.sh -daemon -port 8080 -host 127.0.0.1


Explanation:
- -daemon: Starts ZAP in headless (non-GUI) mode, which is suitable for automation.
- -port 8080: Sets the port for the ZAP proxy to listen on (default is 8080).
- -host 127.0.0.1: Sets the host address to localhost.

---

### Example: Scan with Specific Context
zap-cli spider -c -u http://example.com


Explanation:
- spider: Crawls the target website to discover pages.
- -c: Continues crawling from any previously discovered URLs.
- -u http://example.com: The URL to start the crawl from.

---

### Important Notes:
1. OWASP ZAP is highly customizable and can be extended with a variety of plugins to enhance its functionality.
2. It's great for both beginners and experienced penetration testers, thanks to its automated scanning and manual testing features.
3. Ensure you have authorization to test the application before running ZAP on a target website.