In this chapter, we first learned about the basics of fuzzing and the different types of fuzzing attacks. Then, we moved deeper into web application fuzzing and looked at the installation of Wfuzz and ffuf. After that, we performed fuzzing on HTTP request verbs and request URIs. Toward the end of the chapter, we looked at three scenarios: cookie header fuzzing, user-defined cookie header fuzzing, and custom header fuzzing. Having learned about fuzz testing, you can now understand the behavior of a web application, which will help you to find technical as well as logical vulnerabilities. You can use fuzz testing as part of your regular penetration testing while doing bug bounties, or while playing challenging Capture The Flags (CTFs).
In the next chapter, we will look at the key points that must be included in penetration testing reports.