Filebuster is a HTTP fuzzer / content discovery script with loads of features and built to be easy to use and fast! It uses one of the fastest HTTP classes in the world (of PERL) - Furl::HTTP. Also the thread modelling is optimized to run as fast as possible.
It packs a ton of features like:
Regex patterns on wordlists
Supports HTTP/HTTPS/SOCKS proxy
Allows for multiple wordlists using wildcards
Additional file extensions
Adjustable timeouts and retries
Adjustable delays / throttling
Hide results based on HTTP code, length or words in headers or body
Support for custom cookies
Support for custom headers
Supports multiple versions of the TLS protocol
Automatic TTY detection
Integrated wordlists with custom payloads
Automatic smart encoding
Automatic filtering of results
To install filebuster,
1. git clone the repository
git clone https://github.com/henshin/filebuster
2. Install Perl reuirements using cpan command utility
cpan -T install YAML Furl Benchmark Net::DNS::Lite List::MoreUtils IO::Socket::SSL URI::Escape HTML::Entities IO::Socket::Socks::Wrapper URI::URL Cache::LRU IO::Async::Timer::Periodic IO::Async::Loop
3. After installation, we can run it using perl command interpreter as
perl filebuster.pl --help
for fuzzing of web url, we can use default wordlist provided by the tool or we can use our own with -w option.
perl filebuster.pl -u http://testphp.vulnweb.com
using filebuster, we could fuzz and identify sensitive or hidden files and directories in web app during pentesting.
look for 200, and 300 response from filebuster output.