Online Courses
API Penetration Testing Course
Online Courses
API Penetration Testing Course
  • Introduction
  • Setting Up
    • Tools
    • Hacking Lab
  • API Reconnaissance
    • Introduction to API Reconnaissance
    • Passive Reconnaissance
      • Google Dorking
      • GitDorking
      • TruffleHog
      • API Directories
      • Shodan
      • The Wayback Machine
    • Active Reconnaissance
      • Nmap
      • OWASP Amass
      • Directory Brute-force with Gobuster
      • Kiterunner
      • DevTools
      • Directory Brute-Forcing
  • Endpoint Analysis
    • Reverse Engineering an API
    • Excessive Data Exposure
    • Assessment
  • Scanning APIs
    • Finding Security Misconfigurations
    • Scanning APIs with OWASP ZAP
    • Assessment
  • Authentication Attacks
    • Classic Authentication Attacks
      • Note on Base64 Encoding
    • Token Attacks
    • Assessment
  • Exploiting API Authorization
    • Exploiting API Authorization
    • Broken Object Level Authorization (BOLA)
    • Broken Function Level Authorization (BFLA)
    • Assessment
  • Improper Assets Management
    • Improper Assets Management
    • Finding Improper Assets Management Vulnerabilities
    • Assessment
  • Mass Assignment
    • Mass Assignment Attacks
    • Other Mass Assignment Vectors
    • Hunting for Mass Assignment
    • Assessment
  • Exploiting Server-Side Request Forgery
    • Server-Side Request Forgery
    • Types of SSRF
    • Ingredients for SSRF
    • Testing for SSRF
    • Assessment
  • Injection Vulnerabilities
    • Testing for Injection Vulnerabilities
    • Discovering Injection Vulnerabilities
      • SQL Injection Metacharacters
      • NoSQL Injection
      • OS Injection
    • Fuzzing Wide with Postman
    • Fuzzing Deep with WFuzz
    • Assessment
  • Evasion and Combining Techniques
    • Evasive Maneuvers
    • Combining Techniques
Powered by GitBook
On this page
  • Burp Suite Community Edition
  • Foxy Proxy Standard
  • Burp Suite Certificate
  • MITMweb Certificate Setup
  • Install Postman
  • Install mitmproxy2swagger
  • Install Git
  • Install Docker
  • Install Go
  • The JSON Web Token Toolkit v2
  • Install Kiterunner
  • Install Arjun
  • Install OWASP ZAP
  • Useful Wordlists
  • SecLists
  • Hacking-APIs
  1. Setting Up

Tools

PreviousSetting UpNextHacking Lab

Last updated 1 year ago

Burp Suite Community Edition

Burp Suite should come stock with the latest version of Kali, but if it does not then use the following command:

sudo apt-get install burpsuite -y

Download Jython () and add the .jar file to the Extender Options:

Foxy Proxy Standard

  1. Search for FoxyProxy Standard.

  2. Add FoxyProxy to Firefox.

  3. Install FoxyProxy Standard and add it to your browser.

  4. Click the fox icon at the top-right corner of your browser (next to the URL) and select Options.

  5. Select Proxies >Add New Proxy >Manual Proxy Configuration.

  6. Add 127.0.0.1 as the host IP address.

  7. Update the port to 8080 (Burp Suite’s default proxy settings).

  8. Under the General tab, rename the proxy to BurpSuite.

  9. Add a second new proxy:

    1. Add 127.0.0.1 as the host IP address.

    2. Update the port to 5555.

    3. Under the General tab, rename the proxy to Postman.

Burp Suite Certificate

  1. Start Burp Suite.

  2. Open your browser of choice.

  3. Save the certificate somewhere you can find it.

  4. Open your browser and import the certificate. In Firefox, open Preferences and use the search bar to look up certificates. Import the certificate.

Now that you have the PortSwigger CA certificate added to your browser, you should be able to intercept traffic without experiencing issues.

MITMweb Certificate Setup

Now we will also import the cert for MITMweb through a very similar process.

  1. Stop burpsuite (it's listening on 8080 and mitmweb needs that to work)

  2. Start mitmweb from the terminal:

mitmweb
  1. Use FoxyProxy in Firefox to send traffic to the BurpSuite proxy (8080).

  2. Using Firefox Visit mitm.it.

  1. Download the mitmproxy-ca-cert.pem for Firefox.

  2. Return to the Firefox certificates (see Burp Suite Certificate instructions).

  1. Import the MITMweb (mitmproxy-ca-cert.pem) certificate.

Install Postman

sudo wget https://dl.pstmn.io/download/latest/linux64 -O postman-linux-x64.tar.gz && sudo tar -xvzf postman-linux-x64.tar.gz -C /opt && sudo ln -s /opt/Postman/Postman /usr/bin/postman

Install mitmproxy2swagger

sudo pip3 install mitmproxy2swagger

Install Git

sudo apt-get install git

Install Docker

sudo apt-get install docker.io docker-compose

Install Go

sudo apt install golang-go

The JSON Web Token Toolkit v2

cd /opt
sudo git clone https://github.com/ticarpi/jwt_tool
cd jwt_tool
python3 -m pip install termcolor cprint pycryptodomex requests
sudo chmod +x jwt_tool.py
sudo ln -s /opt/jwt_tool/jwt_tool.py /usr/bin/jwt_tool

Install Kiterunner

sudo git clone  https://github.com/assetnote/kiterunner.git
cd kiterunner
sudo make build
sudo ln -s /opt/kiterunner/dist/kr /usr/bin/kr

Install Arjun

sudo git clone https://github.com/s0md3v/Arjun.git

Install OWASP ZAP

sudo apt install zaproxy

Once ZAP is installed, make sure to navigate to the Manage Add-Ons (CTRL+U). Make sure to apply updates for the Fuzzer and OpenAPI Support.

Useful Wordlists

SecLists

sudo wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip
sudo unzip SecList.zip
sudo rm -f SecList.zip

Hacking-APIs

sudo wget -c https://github.com/hAPI-hacker/Hacking-APIs/archive/refs/heads/main.zip -O HackingAPIs.zip
sudo unzip HackingAPIs.zip
sudo rm -f HackingAPIs.zip

While Firefox is open use the shortcut CTRL+Shift+A or navigate to .

Using FoxyProxy, select the BurpSuite proxy. Navigate to and click the CA Certificate. This should initiate the download of the Burp Suite CA certificate.

https://addons.mozilla.org/en-US/firefox/addon
http://burpsuite
https://www.jython.org/download.html
LogoGitHub - danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.GitHub
LogoGitHub - hAPI-hacker/Hacking-APIsGitHub
Under the Extender BApp Store search for Autorize and install the extension.