Api: Difference between revisions

From Pessin randon wiki
No edit summary
Line 9: Line 9:


===Solution===
===Solution===
Somehow you have to find account name by brute forcing "user" argument, but you have to pass it in POST request. It still have to be sended as url parameter.
I was trying to use wfuzz but even knowing the correct account I could not be able to setup it correctly.


===Tools===
===Tools===

Revision as of 15:25, 9 September 2022

Description

We found a nice target where some backed API communication is happeingn behind the scenes at URL.

Sometimes it is possible to extrtact valuable information by tampering some parameters.

Some dictionary attack may be used against index.php script and it seems that a web proxy is best tool for this job.

Question

Can you reverse engineer messages and extract some information from this endpoint?

Solution

Somehow you have to find account name by brute forcing "user" argument, but you have to pass it in POST request. It still have to be sended as url parameter.

I was trying to use wfuzz but even knowing the correct account I could not be able to setup it correctly.

Tools

Flag