How I just got gained access to 22 unauthorized endpoints across 116 websites (260k endpoints) in about 10 minutes. Use what your comfy with.
👇
Once I have my list of sites. I load them into my Burpsuite site map via Firefox. There are many ways to do it. If it's not thousands of sites, I use the Bulk Open extension. There are others.
I had Burp crawl a bit for me. You can be as thorough as you want in this phase. For the sake of demo. You can let Burp do its thing.
Once that finished. Open up GAP (). Make sure you set "Prefix with selected Targets". github.com/xnl-h4ck3r/GAP…
Select your whole sitemap and send it to the GAP extension.
Once GAP finishes. Copy out your links and feed them into file that you will run FFUF against. In my case, I filtered by "/api", "/admin" and "/user". Those are usually juicy.
We want to run FFUF against all of the urls that your tool GAP output for you, and make sure you save the whole request/response.
Once this finishes, I got about 50 endpoints back which I manually visited. I was able to whittle down from 260k endpoints to about 50 endpoints with interesting information in them. 22 of them were sensitive in nature.
Added bonus, check them for leaked tokens/api keys.
Yesterday, I had a customer send me a nessus report and an app spider report. They were both clean. Few minor config issues that are norm in those automated tools.
They were sure there was nothing to find as they do them monthly.
I found a list of all users, sqli and 2 xss. 👇
I fired up Burpsuite and started manually clicking on all links in the web app. The app isn't more than 20 links and is all .aspx. and has a has a login page for which I don't have creds to.
Using my sitemap I made a custom wordlist of directories and parameters using
@xnl_h4ck3r's GAP tool. I fed the dirs. into Burp's content discovery tool. It hit on a few new endpoints. 'User.asp'. Which contained a list of all usernames for the app. It also had a password policy. I made another list of all users and knowing this is not on ADFS.