FFUF Web Fuzzing
Fast web fuzzer for discovering hidden content, directories, files, and vulnerabilities during penetration testing
WhatIsIt
Expert guidance for using ffuf (Fuzz Faster U Fool), a fast web fuzzer designed for discovering hidden content, directories, files, subdomains, and testing for vulnerabilities during penetration testing. Significantly faster than traditional tools like dirb or dirbuster, with a core focus on auto-calibration to dramatically reduce false positives and make results analysis easier for both humans and AI.
HowToUse
The skill emphasizes a best-practices workflow:
-
Always Use Auto-Calibration - The
-acflag is mandatory for productive pentesting. It automatically detects and filters repetitive false positives, removes noise from dynamic websites, and adapts to the target's specific behavior. -
Basic Discovery - Start with simple directory fuzzing:
ffuf -w wordlist.txt -u https://target.com/FUZZ -ac -
Authenticated Fuzzing - For complex authentication, use raw requests instead of command-line flags:
- Capture authenticated request from Burp Suite or DevTools
- Save to
req.txtwith FUZZ keyword in desired location - Run:
ffuf --request req.txt -w wordlist.txt -ac
-
Advanced Scenarios - Subdomain enumeration, parameter fuzzing, API endpoint discovery, and vulnerability testing with appropriate filtering and rate limiting.
Always save results (-o results.json -of json) and use rate limiting for stealth (-rate 2 -t 10).
KeyFeatures
- Auto-calibration (-ac flag) - Automatically filters repetitive responses and adapts to target behavior
- High-speed fuzzing - Multi-threaded concurrent processing, significantly faster than dirb/dirbuster
- Authenticated fuzzing with raw requests - Supports JWT tokens, session cookies, CSRF tokens via captured HTTP requests
- Comprehensive testing capabilities - Directory/file discovery, subdomain enumeration, parameter fuzzing, API endpoints, vulnerability testing
- Advanced filtering system - Filter by status code, size, regex, line count; interactive mode for runtime adjustments
- Stealth features - Rate limiting and thread control for avoiding detection
- Result preservation - JSON output format for programmatic analysis and reporting
- Defensive security focus - Designed for authorized penetration testing, security research, and responsible disclosure