Fuzz 403ing endpoints for bypasses
This tool will check the endpoint with a couple of headers such as X-Forwarded-For
It will also apply different payloads typically used in dir traversals, path normalization etc. to each endpoint on the path.
e.g. /%2e/test/test2
/test/%2e/test2
/test;/test2/
usage: 403fuzzer.py [-h] [-url URL] [-cookies COOKIES] [-proxy PROXY] [-hc HC] [-hl HL]
use this script to fuzz endpoints that return a 401/403
optional arguments:
-h, --help show this help message and exit
-url URL, -u URL Specify the target URL
-cookies COOKIES, -c COOKIES
Specify cookies to use in requests. eg. '-cookie "cookie1=blah;
cookie2=blah"'
-proxy PROXY, -p PROXY
Specify a proxy to use for requests
-hc HC Hide a specified response code from output
-hl HL Hide a specified response length from output
python3 403fuzzer.py -url http://example.com/test1/test2/test3/forbidden.html
Examples:
-cookies "cookie1=blah"
-cookies "cookie1=blah; cookie2=blah"
Useful if you wanna proxy through Burp
-proxy http://localhost:8080
Examples:
-hc 404 # Hide 404 response codes
-hl 638 # Hide response lengths of 638