xmendez / wfuzz

Web application fuzzer
http://wfuzz.io
GNU General Public License v2.0
5.94k stars 1.39k forks source link

UserWarning:Fatal exception: Bad options: Filter must be specified in the form of #338

Open lfkshf opened 1 year ago

lfkshf commented 1 year ago

so i'm trying brute force an http form in metasploitable app.

here is my command: wfuzz -w /root/test/userName.txt -d "username=FUZZ" -H "Content-Type: application/x-www-form-urlencoded; charset=UTF-8" --sc "uff01" "https://www.xxx.com/web/index.php?c=user&a=register&do=check_username"

and here is the complete output :

/usr/local/lib/python3.10/dist-packages/wfuzz/wfuzz.py:77: UserWarning:Fatal exception: Bad options: Filter must be specified in the form of [int, ... , int, BBB, XXX].

Wfuzz version: 2.4

Python version: Python 3.10.6

OS: linux