KathanP19 / HowToHunt

Collection of methodology and test case for various web vulnerabilities.
GNU General Public License v3.0
6.05k stars 1.73k forks source link

API Penetration Testing #168

Closed Net-hunter121 closed 3 years ago

Net-hunter121 commented 3 years ago

Hidden API Functionality Exposure


Application programming interfaces (APIs) have become a critical part of almost every business. APIs are responsible for transferring information between systems within a company or to external companies. For example, when you log in to a website like Google or Facebook, an API processes your login credentials to verify they are correct.

Steps to Perform This Attack :

Step 1 : Capture the request into Burp, Send the request to repeater and intruder tab Step 2 : Add the endpoint into the intruder tab and add the payload from the word-list Step 3 : 1st use dictionary attack with sec-list on the Endpoint Step 4 : Either use your customized list or use the ones which i have provided in the above section Step 5 : Then simply start the attack, Start checking for 200 status Step 7 : Once their is 200 status OK, Start the recursive scan on the same endpoint for juicy information like swagger doc and so on. step 8 : Other method is to change the API version and try bruteforcing the same endpoint Eg: Redacted.com/api/v1/{Endpoint} ----- Redacted.com/api/v2/{Endpoint}

Note: Their will be minimum limits per request which will be assigned without API keys so make sure to utilize manual approach as much as you can,Then the rest can be automated for scanning the vulnerability in API with automated tools

KathanP19 commented 3 years ago

@all-contributors please add @Net-hunter121 for tutorial

allcontributors[bot] commented 3 years ago

@KathanP19

I've put up a pull request to add @Net-hunter121! :tada:

KathanP19 commented 3 years ago

Nice content, man. I'll add it and look forward to seeing more. 😄