Find Sensitive Files with FFUF

Поделиться
HTML-код
  • Опубликовано: 24 янв 2025

Комментарии • 21

  • @c_war
    @c_war 9 месяцев назад +5

    Please push more advance content 🤗

  • @cyberpro151
    @cyberpro151 9 месяцев назад +5

    Gold fr 💖

  • @donald-gf9wn
    @donald-gf9wn 9 месяцев назад +3

    Hi man!
    Your content is really good. Thank you for your efforts.
    I just have a questions, Do you really fuzz using those huge wordlists on bug bounty targets? then how do you manage the waf blocks and un-intention dos on target? Are program team have no issue if you flood their logs with fuzzing? Have you got any abuse notice for doing so from your ISP?
    If you use rate limiting, then how much and how much threads generally?
    Please guide on this issue.

    • @Ott3rly
      @Ott3rly  9 месяцев назад

      Hey, thanks for checking by and appreciate the feedback. As I mentioned, I use smaller wordlists initially, and then transition to bigger wordlists. If program policy specifies about specific threads/requests per host, I will use same ammount on ffuf. It usually dont say that you can use, for example 5req/s in parrelel to different hosts, so you could fuzz multiple hosts at once.
      To bypass some basic WAF blocks, I recommend checking my WAF bypass playlist as I will be adding more content there soon.

    • @Ott3rly
      @Ott3rly  9 месяцев назад

      To summarize, recommend finding origin IP, switching headers, IP or country. I use VPN in the case the server blocks me.

  • @notoriouslinux
    @notoriouslinux 9 месяцев назад +1

    if anybody dindt asked, how are you brother are you good and its awesome video keep going 🔥

    • @Ott3rly
      @Ott3rly  9 месяцев назад

      All good! Thanks 😁

  • @CookingCooking77
    @CookingCooking77 9 месяцев назад +2

    AWESOME ott3rly . big support from meeeee!!!

    • @Ott3rly
      @Ott3rly  9 месяцев назад

      Thank you! Cheers!

  • @toshitbharti732
    @toshitbharti732 9 месяцев назад +3

    Great buddy 💯

    • @Ott3rly
      @Ott3rly  9 месяцев назад

      Thanks ✌️

  • @Free.Education786
    @Free.Education786 9 месяцев назад +2

    Awesome 👌 Boss ❤🎉🔑💸💉✅️💵🚀💲❤️🔥✔️💰💲🌎📹👉👌💵
    Please, if possible, cover these advanced topics like How to bypass Drupal CMS or other secured CMS? How to bypass HARD WAF protection that stops HTML, SQL, and XSS injection payloads? Payload single-double-triple encoding using Cyber-Chef? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc.,? How to bypass Hard WAF using SQLMAP or Burpsuite? How to find hidden vulnerable parameters and endpoints inside the .js and .jason files? How to find hidden admin pages, cPanel pages, and WHM pages ? Please cover these important topics. Thanks

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy 9 месяцев назад +2

    Why not have some content on how to find BACs ?

    • @Ott3rly
      @Ott3rly  9 месяцев назад +3

      I guess I've needed to have some content that was missing on YT first. I have plans for this in the future, for sure ;)

  • @Pem7
    @Pem7 9 месяцев назад +1

    🤞🏾

  • @charansai9567
    @charansai9567 9 месяцев назад +1

    make with axiom

    • @Ott3rly
      @Ott3rly  9 месяцев назад +1

      Don't need axiom for this, in most of cases ;)

  • @JosephLewis-i7h
    @JosephLewis-i7h 3 месяца назад

    Thomas Ruth Moore Laura Thompson Timothy

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy 9 месяцев назад +1

    :)