Api: Difference between revisions
From Pessin randon wiki
No edit summary |
|||
| Line 9: | Line 9: | ||
===Solution=== | ===Solution=== | ||
Somehow you have to find account name by brute forcing "user" argument, but you have to pass it in POST request. It still have to be sended as url parameter. | |||
I was trying to use wfuzz but even knowing the correct account I could not be able to setup it correctly. | |||
===Tools=== | ===Tools=== | ||
Revision as of 15:25, 9 September 2022
Description
We found a nice target where some backed API communication is happeingn behind the scenes at URL.
Sometimes it is possible to extrtact valuable information by tampering some parameters.
Some dictionary attack may be used against index.php script and it seems that a web proxy is best tool for this job.
Question
Can you reverse engineer messages and extract some information from this endpoint?
Solution
Somehow you have to find account name by brute forcing "user" argument, but you have to pass it in POST request. It still have to be sended as url parameter.
I was trying to use wfuzz but even knowing the correct account I could not be able to setup it correctly.