#
#Arm1tage
@arm1tage1.6K подп.
2.6Kпросмотров
11 апреля 2024 г.
statsScore: 2.8K
Today, we'll talk a bit about JavaScript recon in web applications. I've based my methodology on My Javascript Recon Process - BugBounty. Collecting links to JS files can be done using gau: gau example.com | grep -iE '\.js' | grep -ivE '\.json' | sort -u >> exampleJS.txt Alternatively, you can use waymore, which seems to be better: python3 waymore.py -i example.com -ko "\.js(\?|$)" We can also try fuzzing to find hidden JS files: ffuf -u https://www.example.com/js/ -w jsWordlist.txt -t 200 The wordlist for fuzzing can be found here: https://wordlists.assetnote.io/ After that, ping the JS links as some of them may be outdated. httpx -l exampleJS.txt -mc 200 Now, let's look for secrets in these files using SecretFinder, a tool for detecting sensitive data such as apikeys, accesstokens, authorizations, jwt, etc. in a JS file: cat exampleJS.txt | xargs -n2 -I @ bash -c 'echo -e "\n[URL] @\n";python3 SecretFinder.py -i @ -o cli' >> exampleJsSecrets.txt Next, using availableForPurchase.py, we can check if the domains referenced in the JS files are available for purchase. This tool, combined with linkfinder and collector, is really powerful. Sometimes developers make mistakes when writing a domain, possibly the domain imports an external JavaScript file, etc. cat exampleJS.txt | xargs -I @ bash -c 'python3 linkfinder.py -i @ -o cli' | python3 collector.py output cat output/urls.txt | python3 availableForPurchase.py [NO] www.googleapis.com [YES] www.gooogleapis.com After executing the above command, a list of potential endpoints that were discovered in the JS becomes available for review: cat output/paths.txt We can also immediately check for subdomain takeover using subzy cat output/urls.txt |grep "https\{0,1\}://[^/]\.example\.com/[^ ]" >> subdomainExample.txt; subzy run --targets subdomainExample.txt Also, excellent extensions for Burp: JS Miner and JS Link Finder which perform similar tasks but in real-time, for greater coverage it's better to use both script scanning and plugins
2.6K
просмотров
2134
символов
Нет
эмодзи
Нет
медиа

Другие посты @arm1tage

Все посты канала →
Today, we'll talk a bit about JavaScript recon in web applic — @arm1tage | PostSniper