API Methodology
Recon
1) Passive Recon
2) Active recon
altdns -u SUBS.txt -w /path/to/permutations.txt -r -o altdns.txt -s final_altdns.txtpuredns bruteforce /path/to/wordlist.txt rec.net --resolvers /path/to/resolvers | tee puredns_all_wordlist.txt3) Content Discovery
NOTE: Use tools to rotate your IP address or bypass rate limits if you have been blocked by a WAF.
Steps:
4) Parameter Fuzzing
Exploitation
1) IDOR
2) Broken Access Control (BAC)
3) Authentication Bypass
4) Cross-Site Request Forgery (CSRF)
NOTE: If there are headers like:
CSRF is not exploitable!
5) Cross-Site Scripting XSS (Reflected-Stored-DOM)
NOTE: DO NOT FORGET to check on IFRAME injections!
6) External XML Entity Injection (XXE)
Last updated