• My Book
  • About My website
  • Search

Amit Agarwal Linux Blog

Leveraging ffuf for Timing Attacks: Practical Workflow and Burp Integration

2026-03-23 2 min read Cybersecurity Tools Web Security
A concise, actionable guide to performing timing attacks using ffuf, including filtering response times, troubleshooting, and utilizing Burp requests for precision testing. Continue reading
Ffuf Timing Attacks Web Security Burp Penetration Testing
Latest posts
  • Leveraging ffuf for Timing Attacks: Practical Workflow and Burp Integration
  • Ollama Security Hardening: Practical Guide for Cloud Deployments
  • nmap_cheatsheet.md
  • Convert Man Pages to ASCII, HTML, Markdown, and PDF (Groff + Pandoc)
  • Abusing Active Directory Certificate Services with Certipy: From Initial Access to Beyond Root
  • Building and Breaking a Vulnerable Active Directory Lab: Full Exploitation Walkthrough
  • Run a Local LLM API Server with vLLM (OpenAI-Compatible, Fast, and Simple)
Categories
  • Linux (531)
  • Fedora (343)
  • Bash (217)
  • Uncategorized (191)
  • Learning (156)
  • Photo (76)
  • Vim Tips (37)
Social media
© 2018 - 2026 by Amit Agarwal - rss
Bilberry Hugo Theme