C:\Users\unixcs\Desktop\wfuzz-2.3.4>wfuzz ******************************************************** * Wfuzz 2.4 - The Web Fuzzer * * * * Version up to 1.4c coded by: * * Christian Martorella (cmartorella@edge-security.com) * * Carlos del ojo (deepbit@gmail.com) * * * * Version 1.4d to 2.4 coded by: * * Xavier Mendez (xmendez@edge-security.com) * ********************************************************
Usage: wfuzz [options] -z payload,params <url>
FUZZ, ..., FUZnZ wherever you put these keywords wfuzz will replace them with the values of the specified payload. FUZZ{baseline_value} FUZZ will be replaced by baseline_value. It will be the first request performed and could be used as a base for filtering.
wfuzz.exe -w 1.txt www.baidu.com/FUZZ ******************************************************** * Wfuzz 2.1 - The Web Bruteforcer * ********************************************************
Target: http://www.baidu.com/FUZZ Total requests: 4
================================================================== ID Response Lines Word Chars Request ==================================================================
00000: C=302 7 L 18 W 222 Ch "2" 00001: C=302 7 L 18 W 222 Ch "3" 00002: C=302 7 L 18 W 222 Ch "4" 00003: C=302 7 L 18 W 222 Ch "1"