๐Ÿ”

dast-ffuf

์•ˆ์ „ โš™๏ธ ์™ธ๋ถ€ ๋ช…๋ น์–ด๐ŸŒ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ๐Ÿ”‘ ํ™˜๊ฒฝ ๋ณ€์ˆ˜โšก ์Šคํฌ๋ฆฝํŠธ ํฌํ•จ

Discover hidden web resources with ffuf fuzzing

Identify hidden directories, files, and parameters in web applications that could expose vulnerabilities. Use this skill to perform comprehensive reconnaissance during authorized security testing with the high-performance ffuf fuzzer.

์ง€์›: Claude Codex Code(CC)
๐Ÿฅ‰ 75 ๋ธŒ๋ก ์ฆˆ
1

์Šคํ‚ฌ ZIP ๋‹ค์šด๋กœ๋“œ

2

Claude์—์„œ ์—…๋กœ๋“œ

์„ค์ • โ†’ ๊ธฐ๋Šฅ โ†’ ์Šคํ‚ฌ โ†’ ์Šคํ‚ฌ ์—…๋กœ๋“œ๋กœ ์ด๋™

3

ํ† ๊ธ€์„ ์ผœ๊ณ  ์‚ฌ์šฉ ์‹œ์ž‘

ํ…Œ์ŠคํŠธํ•ด ๋ณด๊ธฐ

"dast-ffuf" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Run ffuf directory enumeration on https://example.com with a common wordlist

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

  • Discovered 47 directories/files:
  • - /admin (403) - Restricted access
  • - /api/v1 (200) - API endpoint
  • - /backup (200) - Backup directory
  • - /config (401) - Configuration files
  • - /wp-admin (200) - WordPress admin
  • ย 
  • Run deeper enumeration on discovered paths with file extensions (.bak, .sql, .zip)

"dast-ffuf" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Fuzz parameters on a login form to find hidden inputs

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

  • Found 12 hidden parameters:
  • - debug (200) - May reveal additional information
  • - redirect (302) - Possible open redirect vulnerability
  • - callback (200) - Potential JSONP endpoint
  • - token (401) - Missing or invalid token required
  • ย 
  • Test discovered parameters for injection vulnerabilities

"dast-ffuf" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Discover virtual hosts on target domain

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

  • Identified 5 valid virtual hosts:
  • - dev.target.com (200) - Development environment
  • - staging.target.com (200) - Staging environment
  • - admin.target.com (403) - Admin interface exposed
  • - api.target.com (200) - API server
  • - git.target.com (401) - Git server detected
  • ย 
  • Each vhost should be enumerated separately

๋ณด์•ˆ ๊ฐ์‚ฌ

์•ˆ์ „
v5 โ€ข 1/16/2026

Documentation-only skill providing guidance for ffuf, a legitimate open-source DAST tool. All static findings are in markdown files and YAML templates showing example commands. No executable code, network operations, or credential access present in the skill itself. Heuristic alerts trigger on expected DAST tool patterns (command execution, network requests, credential handling) which are legitimate functionality for web fuzzing.

6
์Šค์บ”๋œ ํŒŒ์ผ
2,214
๋ถ„์„๋œ ์ค„ ์ˆ˜
4
๋ฐœ๊ฒฌ ์‚ฌํ•ญ
5
์ด ๊ฐ์‚ฌ ์ˆ˜

์œ„ํ—˜ ์š”์ธ

โš™๏ธ ์™ธ๋ถ€ ๋ช…๋ น์–ด (2)
๐ŸŒ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ (2)
๐Ÿ”‘ ํ™˜๊ฒฝ ๋ณ€์ˆ˜ (1)
โšก ์Šคํฌ๋ฆฝํŠธ ํฌํ•จ (1)

ํ’ˆ์งˆ ์ ์ˆ˜

55
์•„ํ‚คํ…์ฒ˜
100
์œ ์ง€๋ณด์ˆ˜์„ฑ
85
์ฝ˜ํ…์ธ 
21
์ปค๋ฎค๋‹ˆํ‹ฐ
100
๋ณด์•ˆ
100
์‚ฌ์–‘ ์ค€์ˆ˜

๋งŒ๋“ค ์ˆ˜ ์žˆ๋Š” ๊ฒƒ

Web reconnaissance

Discover hidden endpoints and directories during authorized penetration tests

CI/CD security testing

Integrate directory fuzzing into automated security pipelines

DAST reconnaissance

Perform comprehensive web application reconnaissance before detailed testing

์ด ํ”„๋กฌํ”„ํŠธ๋ฅผ ์‚ฌ์šฉํ•ด ๋ณด์„ธ์š”

Basic directory scan
Use ffuf to enumerate directories on https://target.example.com using a common wordlist. Show only 200 and 403 status codes.
Parameter fuzzing
Fuzz GET parameter names on https://api.target.com/endpoint to discover hidden parameters using ffuf with appropriate filtering.
VHost discovery
Discover virtual hosts on target.example.com using ffuf with Host header fuzzing. Filter by response size to identify valid vhosts.
Auth testing
Use ffuf in clusterbomb mode to test username and password combinations on https://target.com/login. Show matched responses only.

๋ชจ๋ฒ” ์‚ฌ๋ก€

  • Obtain written authorization before testing any target system
  • Start with small wordlists and increase size gradually to avoid overwhelming targets
  • Use rate limiting (-p and -t flags) to respect target resources

ํ”ผํ•˜๊ธฐ

  • Testing systems without proper authorization
  • Using maximum concurrency without considering target capacity
  • Ignoring false positive filtering, causing noise in results

์ž์ฃผ ๋ฌป๋Š” ์งˆ๋ฌธ

What external tools does this skill require?
This skill requires ffuf (Fast Web Fuzzer) installed locally. Install via: go install github.com/ffuf/ffuf/v2@latest
What wordlists should I use?
Common wordlists include SecLists Discovery directories and raft-small-files. Start small, then scale up based on results.
Can I integrate this with CI/CD pipelines?
Yes, use the provided CI/CD template to run directory scans against staging environments. Export results in JSON format.
Is credential fuzzing legal?
Only test systems you own or have explicit written authorization for. Testing third-party systems may violate computer fraud laws.
How do I reduce false positives?
Use auto-calibration (-ac) or manual filtering by status code, response size, and word count to exclude baseline responses.
How does this differ from other DAST tools?
ffuf is a focused fuzzer optimized for speed and flexibility. Use it for reconnaissance, then complement with ZAP or Burp for deeper analysis.

๊ฐœ๋ฐœ์ž ์„ธ๋ถ€ ์ •๋ณด

์ž‘์„ฑ์ž

AgentSecOps

๋ผ์ด์„ ์Šค

MIT

์ฐธ์กฐ

main

ํŒŒ์ผ ๊ตฌ์กฐ

๐Ÿ“ assets/

๐Ÿ“„ ci-config-template.yml

๐Ÿ“„ rule-template.yaml

๐Ÿ“ references/

๐Ÿ“„ EXAMPLE.md

๐Ÿ“„ WORKFLOW_CHECKLIST.md

๐Ÿ“„ SKILL.md