Skip to content

Commit ca0b344

Browse files
authored
Update Hidden_API_Functionality_Exposure.md
Readability maintenance KathanP19#3
1 parent 6eedec8 commit ca0b344

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

API_Testing/Hidden_API_Functionality_Exposure.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,16 @@
99

1010
## Steps to Perform This Attack :
1111
```
12-
Step 1 : Capture the request into Burp, Send the request to repeater and intruder tab
13-
Step 2 : Add the endpoint into the intruder tab and add the payload from the word-list
14-
Step 3 : 1st use dictionary attack with sec-list on the Endpoint
15-
Step 4 : Either use your customized list or use the ones which i have provided in the above section
16-
Step 5 : Then simply start the attack, Start checking for 200 status
17-
Step 7 : Once their is 200 status OK, Start the recursive scan on the same endpoint for juicy information like swagger doc and so on.
12+
Step 1 : Capture the request into Burp, Send the request to repeater and intruder tab.
13+
Step 2 : Add the endpoint into the intruder tab and add the payload from the word-list.
14+
Step 3 : First use dictionary attack with SecLists (https://github.com/danielmiessler/SecLists) on the Endpoint.
15+
Step 4 : Either use your customized list or use the ones which I have provided in the above step.
16+
Step 5 : Then simply start the attack, start checking for 200 status.
17+
Step 7 : Once there is HTTP 200 OK status, start the recursive scan on the same endpoint for juicy information like swagger doc and so on.
1818
step 8 : Other method is to change the API version and try bruteforcing the same endpoint
1919
Eg: Redacted.com/api/v1/{Endpoint} ----- Redacted.com/api/v2/{Endpoint}
2020
```
21-
* Note: Their will be minimum limits per request which will be assigned without API keys so make sure to utilize manual approach as much as you can,Then the rest can be automated for scanning the vulnerability in API with automated tools.
21+
* Note: There will be minimum limits per request which will be assigned without API keys so make sure to utilize manual approach as much as you can, then the rest can be automated for scanning the vulnerability in API with automated tools.
2222

2323
## Contributor:
2424
- [N3T_hunt3r](https://twitter.com/N3T_hunt3r)

0 commit comments

Comments
 (0)