You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
000000001: 404 11 L 72 W 1558 Ch "http://www.google.com/0 | Mon, 02 Nov 2020 19:29:03 GMT | Mon, 02 Nov 2020 19:27:27 GMT"
666
+
...
667
+
636
668
Re-writing a payload
637
669
"""""""
638
670
@@ -740,6 +772,12 @@ The above command will generate HTTP requests such as the following::
740
772
741
773
You can filter the payload using the filter grammar as described before.
742
774
775
+
Reutilising previous results
776
+
--------------------------------------
777
+
778
+
Plugins results contain a treasure trove of data. Wfuzz payloads and object introspection (explained in the filter grammar section) exposes a Python object interface to plugins results.
779
+
This allows you to perform semi-automatic tests based on plugins results or compile a set of results to be used in another tool.
When using the default output you can also select additional FuzzResult's fields to show, using --efield, together with the payload description::
255
+
When using the default or raw output you can also select additional FuzzResult's fields to show, using --efield, together with the payload description::
256
256
257
257
$ wfuzz -z range --zD 0-1 -u http://testphp.vulnweb.com/artists.php?artist=FUZZ --efield r
258
258
...
@@ -262,7 +262,7 @@ When using the default output you can also select additional FuzzResult's fields
262
262
Host: testphp.vulnweb.com
263
263
...
264
264
265
-
The above is useful, for example, to debug what exact HTTP request Wfuzz sent to the remote Web server.
265
+
The above command is useful, for example, to debug what exact HTTP request Wfuzz sent to the remote Web server.
266
266
267
267
To completely replace the default payload output you can use --field instead::
268
268
@@ -279,4 +279,14 @@ To completely replace the default payload output you can use --field instead::
279
279
000000001: 200 104 L 364 W 4735 Ch "0 | http://testphp.vulnweb.com/artists.php?artist=0 | 4735"
280
280
...
281
281
282
+
The field printer can be used with a --efield or --field expression to list only the specified filter expressions without a header or footer::
283
+
284
+
285
+
$ wfuzz -z list --zD https://www.airbnb.com/ --script=links --script-args=links.regex=.*js$,links.enqueue=False -u FUZZ -o field --field plugins.links.link | head -n3
The above command is useful, for example, to pipe wfuzz into other tools or perform console scripts.
291
+
282
292
--efield and --field are in fact filter expressions. Check the filter language section in the advance usage document for the available fields and operators.
0 commit comments