Fuffme - Install Web Fuzzing Target on Debian
Web fuzzers can find unlinked, hidden directories. They can also find vulnerabilities in query parameters.
This article shows you how to install ffufme pratice target and ffuf, the leading web fuzzer.
Use of ethical hacking techniques requires legal and ethical considerations. To safely use these penetration testing tools, tactics and procedures, you might need to obtain contracts and permissions; and posses adequate technical skills. Check your local laws.
BETA: this article has not yet been troughoutly tested. If you find or fix any bugs, leave a comment.
Fuff is the leading web fuzzing tool. This article teaches you how to install the tool, ffuf. We'll also install a local practice target, so you can practice safely. You can only legally fuzz your own computer, or practice targets with prior permission.
This article is tested on Debian 12-Bookworm, but probably works with minor modifications on other Linuxes, such as Kali or Ubuntu. You need to know Linux command line, and you should have the skills and know the limits of ethical hacking practice.
Install Fuff and Fuffme
Install prerequisites for ffufme target, and fuff.
$ sudo apt-get update $ sudo apt-get install docker.io git ffuf
Build practice target Docker container
$ git clone https://github.com/adamtlangley/ffufme $ cd ffufme/ $ sudo docker build -t ffufme .
Run the target
$ sudo docker run -d -p 80:80 ffufme $ curl localhost
Test that it works. You can of course use a browser on the same computer, http://localhost/
$ curl -si localhost|grep title <title>FFUF.me</title>
Did you get a web page titled FFUF.me? Well done, your target is up.
$ mkdir $HOME/wordlists $ cd $HOME/wordlists $ wget http://ffuf.me/wordlist/common.txt $ wget http://ffuf.me/wordlist/parameters.txt $ wget http://ffuf.me/wordlist/subdomains.txt $ cd -
You can disconnect your computer from the Internet during practice to make sure that all fuzzing packets stay on your own computer.
$ ffuf -w $HOME/wordlists/common.txt -u http://ffuf.me/cd/basic/FUZZ
This command is from fuffme's instructions, found on http://localhost
Did you find "class" and "development.log"? Well done, you're now a fuzzer!
Stay safe, legal and ethical. Only use your new powers for good.
I did it! What now?
There are also many other exercises with Fuffme. They are listed on Fuffme homepage http://localhost
No trouble? No need to do troubleshooting.
If you already did all fuffme exercises, you can try Tero's other fuff article
80: bind: address already in use
Only one daemon can listen to a port at one time.
$ sudo docker run -d -p 80:80 ffufme d58807c94227ecaf6eecc45194c8bf9c4c6d5a7f5e2c61fd600e722cf049f2d5 docker: Error response from daemon: driver failed programming external connectivity on endpoi nt competent_tharp (741f8c777be745a914e9cba97afb1d5eebe92a92a0e2b42f00b9f0eb36000229): Error starting userland proxy: listen tcp4 0.0.0.0:80: bind: address already in use.
Shut down any other daemon listening to HTTP port 80/tcp. For example, if you're running Apache
$ sudo systemctl disable --now apache2.service
And try running ffufme Docker container again
$ sudo docker run -d -p 80:80 ffufme
You can see all your listening TCP ports and related processes with
$ sudo ss -lptn|tr -s ' '
Did not find anything
Problem: Just ran ffuf against localhost, but found nothing.
Solution 1: Use full URL. "-u http://localhost/cd/basic/FUZZ" works, partial URL without "http" does not.
Solution 2: Use a directory with something to find. The command is in the manual you can find by browsing to http://localhost