JavaScript Analysis


Static Analysis

  1. Gather JavaScript Files

1. Filter Proxy HTTP history to only show files with the js extension:
2. Within Burp Suite's Proxy HTTP history, click the Filter bar at the top of the GUI.
Burp Suite’s proxy history
3. Mark the resulting list of JavaScript files and Copy URLs
4. Save the URLs to a text file `js.txt`
5. Use `wget -i js.txt` to download them
6. Alternatively, you can use the developer tools of your browser, 
    to download files one by one:
  1. Identify Endpoints

python linkfinder.py -i 'js/*' -o result.html
python linkfinder.py -i 'js/*' -o cli
  • Bookmark this js code to extract all paths from js files

javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\\"|\\'|\\`))\\/[a-zA-Z0-9_?&=\\/\\-\\#\\.]*(?=(\\"|\\'|\\`))/g;const%20results=new%20Set;for(var%20i=0;i<scripts.length;i++){var%20t=scripts[i].src;""!=t&&fetch(t).then(function(t){return%20t.text()}).then(function(t){var%20e=t.matchAll(regex);for(let%20r%20of%20e)results.add(r[0])}).catch(function(t){console.log("An%20error%20occurred:%20",t)})}var%20pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const%20match%20of%20matches)results.add(match[0]);function%20writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();
  • This OneLiner extracts all API endpoints from AngularJS & Angular JavaScript files

curl -s URL |grep-Po "(\\)(?:[a-zA-Z\\-_\\:\\.0-9\\(\\]+))(V)*(?:[a-zA-Z\\-1:\\.0-9\\(\\]+))(\\)((?:[a-zA-Z\\-_\\1:1.0-9\\(\\+)" I sort -u
  1. Detect Secrets

  • With truffelhog tool

./trufflehog filesystem ~/Downloads/js --no-verification --include-detectors="all"
  • With Burp

// BChecks
https://github.com/PortSwigger/BChecks/blob/main/other/tokens/Certain-leaks-checker.bcheck
https://github.com/PortSwigger/BChecks

// Extention
JSMiner
  1. Search for their exploit in https://security.snyk.io/

  • Manually Extract Endpoints and Paths

- Identify all JS files by browsing the target’s functionalities and interacting with buttons and forms.
Extract JS Files in Burp Suite

- Use Burp Suite's HTTP history to filter and save in-scope JavaScript files (without Base64 encoding).
Identify Unique Endpoints

- Select at least 10 endpoints, focusing on those with variables (like IDs).
Pattern Recognition with Regex

- Observe endpoint patterns in JS files; create regex to match these patterns and automate discovery.
Automated Extraction Tools

- Use tools like jsluice, endext, or xnLinkFinder to assist with endpoint extraction.
Spot Endpoint Patterns

- Identify naming conventions (e.g., get or update) and explore modifications to discover hidden endpoints.
Prioritize Critical Endpoints

- Focus on sensitive areas (e.g., payments, admin) and use regex to search for secrets in these endpoints.
Advanced Fuzzing

- Extract strings within double quotes ("") and use them to fuzz for additional paths and endpoints.

Dynamic Analysis

  • Function Monitoring

monitor(FUNCTION);

// If Function Sends Json Objects function hook
var old = FUNCTION;
FUNCTION = function (ar ) {
    console.log("FUCNCTION called with arguments: " + JSON.stringify(ar));
    return old(ar);
}

// monitor Getter and Setter
monitor(location.__lookupGetter__("hash"));
monitor(location.__lookupSetter__("hash"));
debug(location.__lookupGetter__("hash"));
debug(location.__lookupSetter__("hash"));

// Find Function
$("").datepicker();
  • Break Points on modifications

- Write click on the tag or attribute 
- select Break on
- Choose between options (attripute modification or asubtree modification)

Last updated