Reconnaissance

Subdomain Enumeration

Tools

Write ups

API Recon

  1. Check for documentation

    • Swagger -> /openapi.json

    • GraphQL -> https://graphql.org/learn/introspection/ -> https://github.com/prisma-labs/get-graphql-schema

    • manual -> site:target.tld intitle:api | developer

  2. Search for APIs

    • site:target.tld inurl:api

    • intitle:"index of" "api.yaml" site:target.tld

    • intitle:"index of" intext:"apikey.txt" site:target.tld

    • allintext:"API_SECRET*" ext:env | ext:yml site:target.tld

  3. Enumerate endpoints / methods

    • https://wordlists-cdn.assetnote.io/data/automated/httparchive_apiroutes_2023_08_28.txt

    • swagger -> https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/swagger.txt

    • Tools -> ffuf -> kiterunner

One-liners & Quick Wins


Fingerprinting

  • Waf Detect

  • uncover >> discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.

JS Files

Tools

Bypass WAF and Find Origin IPs

Using hakoriginfinder

  1. Discover your target's ASN and check https://bgp.he.net/AS33848#_prefixes…

  2. Make a note of the target's IP range.

  3. Assuming you have a WAF-protected domain called example[.]com. Use this command with the IP range Identified in step 1 and pass your target host against the -h parameter:

If you receive a "MATCH" output, there's a strong likelihood that you've successfully identified the Origin IP. Now, you can send requests with the same Host header to bypass WAF

Using Netlas/Shodan

  1. Go to Netlas, shodan, SecurityTrails or other similar platforms

  2. Make filters like http.title:"My_target_title"

  3. Sometyimes There is Origin IPs exposed

Fuzzing Tips

FFuf Tips

Last updated

Was this helpful?