Using Wfuzz as an alternative to burp intruder?

hi, i am trying to solve this lab [https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses](https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses) , which requires the burp intruder to test for each character using two payload positions and cluster bomb attack type and grep the “welcome back” conditional response. community version of burpsuite however has a time throttle and is incredibly slow. I am trying to use Wfuzz to do this but i dont have any idea. I also read somewhere that this could also be done using http fuzz module of patator. some insight please?

READ:   Everything you need to know about the WhatsApp ONLINE
Updates
0

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Menu