Skip to content

Commit

Permalink
typos in docs
Browse files Browse the repository at this point in the history
  • Loading branch information
xmendez committed Apr 21, 2019
1 parent 08c2e3c commit 83c9b9f
Show file tree
Hide file tree
Showing 4 changed files with 26 additions and 26 deletions.
6 changes: 3 additions & 3 deletions docs/library/guide.rst
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ Fuzzing a URL with wfuzz library is very simple. Firstly, import the wfuzz modul

>>> import wfuzz

Now, let's try to fuzz a webpage to look for hidden content, such as directories. For this example, let's use Acunetix's testphp (http://testphp.vulnweb.com/)::
Now, let's try to fuzz a web page to look for hidden content, such as directories. For this example, let's use Acunetix's testphp (http://testphp.vulnweb.com/)::

>>> import wfuzz
>>> for r in wfuzz.fuzz(url="http://testphp.vulnweb.com/FUZZ", hc=[404], payloads=[("file",dict(fn="wordlist/general/common.txt"))]):
Expand Down Expand Up @@ -90,7 +90,7 @@ FuzzSession can also be used as context manager::
Get payload
===========

The get_payload function generates a Wfuzz payload from a Python iterable. It is a quick and flexible way of getting a payload programatically without using Wfuzz payloads plugins.
The get_payload function generates a Wfuzz payload from a Python iterable. It is a quick and flexible way of getting a payload programmatically without using Wfuzz payloads plugins.

Generating a new payload and start fuzzing is really simple::

Expand Down Expand Up @@ -128,7 +128,7 @@ The get_payloads method can be used when various payloads are needed::
Get session
===========

The get_session function generates a Wfuzz session object from the specified command line. It is a quick way of getting a payload programatically from a string representing CLI options::
The get_session function generates a Wfuzz session object from the specified command line. It is a quick way of getting a payload programmatically from a string representing CLI options::

$ python
>>> import wfuzz
Expand Down
34 changes: 17 additions & 17 deletions docs/user/advanced.rst
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Advanced Usage
Wfuzz global options
--------------------

Wfuzz global options can be tweaked by modifying the "wfuzz.ini" at the user's home direcory::
Wfuzz global options can be tweaked by modifying the "wfuzz.ini" at the user's home directory::

~/.wfuzz$ cat wfuzz.ini

Expand Down Expand Up @@ -196,9 +196,9 @@ Wfuzz's web application vulnerability scanner is supported by plugins. A list of

Scripts are grouped in categories. A script could belong to several categories at the same time.

Thre are two general categories:
There are two general categories:

* passive: Passive scripts analyze existing requests and responses without performing new requests.
* passive: Passive scripts analyse existing requests and responses without performing new requests.
* active: Active scripts perform new requests to the application to probe it for vulnerabilities.

Additional categories are:
Expand Down Expand Up @@ -330,7 +330,7 @@ This useful, for example, to test if a reverse proxy can be manipulated into mis
Scan Mode: Ignore Errors and Exceptions
---------------------------------------

In the event of a network problem (e.g. DNS failure, refused connection, etc), Wfuzz will raise an exception and stop execution as shown below::
In the event of a network problem (e.g. DNS failure, refused connection, etc.), Wfuzz will raise an exception and stop execution as shown below::

$ wfuzz -z list,support-web-none http://FUZZ.google.com/
********************************************************
Expand Down Expand Up @@ -400,7 +400,7 @@ Timeouts

You can tell Wfuzz to stop waiting for server to response a connection request after a given number of seconds --conn-delay and also the maximum number of seconds that the response is allowed to take using --req-delay parameter.

These timeouts are really handy when you are using Wfuzz to bruteforce resources behind a proxy, ports, hostnames, virtual hosts, etc.
These timeouts are really handy when you are using Wfuzz to brute force resources behind a proxy, ports, hostnames, virtual hosts, etc.

Filter Language
---------------
Expand Down Expand Up @@ -458,8 +458,8 @@ BBB Baseline
Name Short version Description
================================ ======================= =============================================
value|unquote() value|un() Unquotes the value
value|lower() value|l() lowercase of the value
value|upper() uppercase of the value
value|lower() value|l() lower-case of the value
value|upper() upper-case of the value
value|encode('encoder', 'value') value|e('enc', 'val') Returns encoder.encode(value)
value|decode('decoder', 'value') value|d('dec', 'val') Returns encoder.decode(value)
value|replace('what', 'with') value|r('what', 'with') Returns value replacing what for with
Expand Down Expand Up @@ -538,7 +538,7 @@ urlp.hasquery Returns true when the URL contains a query string.
urlp.isbllist Returns true when the URL file extension is included in the configuration discovery's blacklist
=================== =============================================

Payload instrospection can also be performed by using the keyword FUZZ:
Payload introspection can also be performed by using the keyword FUZZ:

============ ==============================================
Name Description
Expand All @@ -552,7 +552,7 @@ Where field is one of the described above.
Filtering results
^^^^^^^^^^^^^^^^^

The --filter command line parameter in conjuntion with the described filter language allows you to peform more complex result triage than the standard filter switches such as "--hc/hl/hw/hh", "--sc/sl/sw/sh" and "-ss/hs".
The --filter command line parameter in conjunction with the described filter language allows you to perform more complex result triage than the standard filter switches such as "--hc/hl/hw/hh", "--sc/sl/sw/sh" and "-ss/hs".

An example below::

Expand All @@ -576,7 +576,7 @@ An example below::
Filtered Requests: 9
Requests/sec.: 7.572076

Using result and payload instrospection to look for specific content returned in the response::
Using result and payload introspection to look for specific content returned in the response::

$ wfuzz -z list,echoedback -d searchFor=FUZZ --filter "content~FUZZ" http://testphp.vulnweb.com/search.php?test=query

Expand All @@ -602,8 +602,8 @@ Filtering a payload
Slice
"""""""

The --slice command line parameter in conjuntion with the described filter language allows you to filter a payload.
The payload to filter, specified by the -z switch must preceed --slice comamand line parameter.
The --slice command line parameter in conjunction with the described filter language allows you to filter a payload.
The payload to filter, specified by the -z switch must precede --slice command line parameter.

An example is shown below::

Expand Down Expand Up @@ -642,7 +642,7 @@ In this context you are filtering a FuzzResult object, which is the result of co
Reutilising previous results
--------------------------------------

Previously performed HTTP requests/responses contain a treasure trove of data. Wfuzz payloads and object instrospection (explained in the filter grammar section) exposes a Python object interface to requests/responses recorded by Wfuzz or other tools.
Previously performed HTTP requests/responses contain a treasure trove of data. Wfuzz payloads and object introspection (explained in the filter grammar section) exposes a Python object interface to requests/responses recorded by Wfuzz or other tools.

This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation.

Expand All @@ -665,7 +665,7 @@ $ wfuzz --oF /tmp/session -z range,0-10 http://www.google.com/dir/test.php?id=FU

Wfuzz can read burp's (TM) log or saved states. This allows to filter or reutilise burp proxy requests and responses.

Then, you can reutilise those results by using the denoted payloads. To repeat a request exactly how it was stored, you must use the FUZZ keywork on the command line::
Then, you can reutilise those results by using the denoted payloads. To repeat a request exactly how it was stored, you must use the FUZZ keyword on the command line::

$ wfuzz -z burpstate,a_burp_state.burp FUZZ

Expand All @@ -691,7 +691,7 @@ Previous requests can also be modified by using the usual command line switches.
|__ C=200 114 L 373 W 5347 Ch "http://testphp.vulnweb.com/userinfo.php"


* Same request against another url::
* Same request against another URL::

$ wfuzz -z burpstate,a_burp_state.burp -H "addme: header" -u http://www.otherhost.com FUZZ

Expand All @@ -701,7 +701,7 @@ If you do not want to use the full saved request:

$ wfuzz -z wfuzzp,/tmp/session --zP attr=url FUZZ

* Or by specyfing the FUZZ keyword and a field name in the form of FUZZ[field]::
* Or by specifying the FUZZ keyword and a field name in the form of FUZZ[field]::

$ wfuzz -z wfuzzp,/tmp/session FUZZ[url]

Expand Down Expand Up @@ -744,7 +744,7 @@ For example, the following will return a unique list of HTTP requests including

$ wfpayload -z burplog,a_burp_log.log --slice "params.get~'authtoken' and url.pstrip|u()"

Authtoken is the parameter used by BEA WebLogic Commerce Servers (TM) as a CSRF token, and thefore the above will find all the requests exposing the CSRF token in the URL.
Authtoken is the parameter used by BEA WebLogic Commerce Servers (TM) as a CSRF token, and therefore the above will find all the requests exposing the CSRF token in the URL.

You can also select the field to show, for example::

Expand Down
8 changes: 4 additions & 4 deletions docs/user/basicusage.rst
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ Headers can also be fuzzed::
Fuzzing HTTP Verbs
------------------

HTTP verbs fuzzing can be specified using the -X swith::
HTTP verbs fuzzing can be specified using the -X switch::

$ wfuzz -z list,GET-HEAD-POST-TRACE-OPTIONS -X FUZZ http://testphp.vulnweb.com/
********************************************************
Expand Down Expand Up @@ -193,7 +193,7 @@ If you want to fuzz a resource from a protected website you can also use "--basi
Recursion
---------

The -R swith can be used to specify a payload recursion's depth. For example, if you want to search for existing directories and then fuzz within these directories again using the same payload you can use the following command::
The -R switch can be used to specify a payload recursion's depth. For example, if you want to search for existing directories and then fuzz within these directories again using the same payload you can use the following command::

$ wfuzz -z list,"admin-CVS-cgi\-bin" -R1 http://testphp.vulnweb.com/FUZZ
********************************************************
Expand Down Expand Up @@ -236,7 +236,7 @@ Wfuzz supports writing the results to a file in a different format. This is perf

$ wfuzz -e printers

For example, to write results to an output file in json format use the following command::
For example, to write results to an output file in JSON format use the following command::

$ wfuzz -f /tmp/outfile,json -w wordlist/general/common.txt http://testphp.vulnweb.com/FUZZ

Expand All @@ -248,7 +248,7 @@ Wfuzz supports showing the results in various formats. This is performed by plug

$ wfuzz -e printers

For example, to show results in json format use the following command::
For example, to show results in JSON format use the following command::

$ wfuzz -o json -w wordlist/general/common.txt http://testphp.vulnweb.com/FUZZ

Expand Down
4 changes: 2 additions & 2 deletions docs/user/getting.rst
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ The obtained output is shown below::
Filtered Requests: 0
Requests/sec.: 225.4143

Wfuzz output allows to analyze the web server responses and filter the desired results based on the HTTP response message obtained, for example, response codes, response length, etc.
Wfuzz output allows to analyse the web server responses and filter the desired results based on the HTTP response message obtained, for example, response codes, response length, etc.

Each line provides the following information:

Expand Down Expand Up @@ -236,7 +236,7 @@ Here the {} defines the value of the FUZZ word for this first HTTP request, and
Regex filters
^^^^^^^^^^^^^

The command line parameters "--ss" and "--hs" allow to filter the responses using a regular expression against the returned content. For example, the following allows to find web servers vulnerables to "shellshock" (see http://edge-security.blogspot.co.uk/2014/10/scan-for-shellshock-with-wfuzz.html for more information)::
The command line parameters "--ss" and "--hs" allow to filter the responses using a regular expression against the returned content. For example, the following allows to find web servers vulnerable to "shellshock" (see http://edge-security.blogspot.co.uk/2014/10/scan-for-shellshock-with-wfuzz.html for more information)::

$ wfuzz -H "User-Agent: () { :;}; echo; echo vulnerable" --ss vulnerable -w cgis.txt http://localhost:8000/FUZZ

Expand Down

0 comments on commit 83c9b9f

Please sign in to comment.