General
Last updated
Was this helpful?
Last updated
Was this helpful?
Use Burp/ZAP to actively scan the target for common security misconfigurations, such as missing security headers (Figure 1). Validate each one as this may include many false positives.
The below example as well as the one on the are based on the application.
Investigate the base path of each endpoint (Figure 2 & 3).
The example below is based on PostSwigger's module.
We can use the Burp extension to search within the JavaScript files for patterns that suggest API endpoints (Figure 4).