Revision of What we did with FFUF The words from the wordlist https://udemy-images.s3.amazonaws.com/redactor/raw/2020-08-05_10-57-39-c7bbe88cc944e6f0565c2c592a141d95.png?width=1920 Requests that will be sent to the target https://udemy-images.s3.amazonaws.com/redactor/raw/2020-08-05_10-57-39-ab76954439da15135cde445d387a63c8.png?width=1920 Final Command and Output Command - ffuf -u http://192.168.0.105/FUZZ -w wordlist.txt Terminal Output : https://udemy-images.s3.amazonaws.com/redactor/raw/2020-08-05_10-57-39-5d973ed87aa7d263950f3cf2f416beb2.png?width=1920 --> Then we got sensitive files and directories like secrets.txt , api key , env, passwd file etc. https://udemy-images.s3.amazonaws.com/redactor/raw/2020-08-05_20-44-20-6c09068ec68a1e72a735fa380751a096.png?width=1920