Hacking APIs: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
Line 22: Line 22:
== Intercepting proxies ==
== Intercepting proxies ==
These let you view, edit, and replay requests, and are extremely useful for finding vulnerabilities in web, mobile and API applications.
These let you view, edit, and replay requests, and are extremely useful for finding vulnerabilities in web, mobile and API applications.
* https://portswigger.net/burp
* https://portswigger.net/burp (If a WAF is blocking Burpsuite then [https://stackoverflow.com/questions/70129432/how-to-bypass-cloudflare-protection-with-burp try editing your user-agent string])
* https://www.zaproxy.org
* https://www.zaproxy.org
* https://mitmproxy.org
* https://mitmproxy.org
* https://www.postman.com [https://enlacehacktivista.org/index.php?title=Learn_to_hack#API_Hacking (API focused)]
* https://www.postman.com [https://enlacehacktivista.org/index.php?title=Learn_to_hack#API_Hacking (API focused)]
* https://github.com/projectdiscovery/proxify
* https://github.com/projectdiscovery/proxify

Revision as of 19:57, 3 August 2023