AngryFuzzer – Tool for Information Gathering on Kali Linux
Last Updated :
17 Oct, 2021
Fuzzing is the process in which the detection of hidden files and directories is done. These files and directories can contain some sensitive data like SSH keys, Usernames, Passwords, etc. So to detect these files and directories we use automated tools. AngryFuzzer is an automated tool developed in the Python Language used to fuzz directories from target URLs by using the brute-forcing approach. AngryFuzzer tool also supports CMS Fuzz in which WordPress, Drupal, Joomla sites are been supported.AngryFuzzer tool is available on the GitHub platform, it’s free and open-source to use.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Installation of AngryFuzzer Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/ihebski/angryFuzzer.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd angryFuzzer
Step 3: You are in the directory of the AngryFuzzer. Now you have to install a dependency of the AngryFuzzer using the following command.
sudo pip install -r requirements.txt
Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.
./angryFuzzer.py -h
Working with AngryFuzzer Tool on Kali Linux OS
Example 1: Fuzzing an URL with the default dictionary
./angryFuzzer.py -u http://geeksforgeeks.org
Example 2: Fuzzing CMS
./angryFuzzer.py -u http://geeksforgeeks.org --cms wp
Example 3: Fuzzing a custom Word-list
./angryFuzzer.py -u http://geeksforgeeks.org -w /home/kali/Desktop/directory-list-2.3-small.txt
In the below screenshot, we have displayed the contents of the directory-list-2.3-small.txt wordlist file, which we will be using to fuzz the directories from http://geeksforgeeks.org domain.
The tool has detected some 200 Response Code directories.
Like Article
Suggest improvement
Share your thoughts in the comments
Please Login to comment...