Santa's watching
Web Exploitation - gobuster ; wfuzz
Video
Resources
Challenge
Deploy your AttackBox
Given the URL "http://shibes.xyz/api.php", what would the entire wfuzz command look like to query the "breed" parameter using the wordlist "big.txt" (assume that "big.txt" is in your current directory)
Use GoBuster (against the target you deployed -- not the shibes.xyz domain) to find the API directory. What file is there?



Fuzz the date parameter on the file you found in the API directory. What is the flag displayed in the correct post?


Last updated