githubEdit

Reconnaissance

Subdomain Enumeration

Tools

Write ups

API Recon

  1. Check for documentation

    • Swagger -> /openapi.json

    • GraphQL -> https://graphql.org/learn/introspection/ -> https://github.com/prisma-labs/get-graphql-schema

    • manual -> site:target.tld intitle:api | developer

  2. Search for APIs

    • site:target.tld inurl:api

    • intitle:"index of" "api.yaml" site:target.tld

    • intitle:"index of" intext:"apikey.txt" site:target.tld

    • allintext:"API_SECRET*" ext:env | ext:yml site:target.tld

  3. Enumerate endpoints / methods

    • https://wordlists-cdn.assetnote.io/data/automated/httparchive_apiroutes_2023_08_28.txt

    • swagger -> https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/swagger.txt

One-liners & Quick Wins


Fingerprinting

JS Files

Tools

Bypass WAF and Find Origin IPs

Using hakoriginfinder

  1. Discover your target's ASN and check https://bgp.he.net/AS33848#_prefixes…arrow-up-right

  2. Make a note of the target's IP range.

  3. Assuming you have a WAF-protected domain called example[.]com. Use this command with the IP range Identified in step 1 and pass your target host against the -h parameter:

If you receive a "MATCH" output, there's a strong likelihood that you've successfully identified the Origin IP. Now, you can send requests with the same Host header to bypass WAF

Using Netlas/Shodan

  1. Go to Netlasarrow-up-right, shodanarrow-up-right, SecurityTrails or other similar platforms

  2. Make filters like http.title:"My_target_title"

  3. Sometyimes There is Origin IPs exposed

Fuzzing Tips

FFuf Tips

Last updated

Was this helpful?