General
Active Scan
Use Burp/ZAP to actively scan the target for common security misconfigurations, such as missing security headers (Figure 1). Validate each one as this may include many false positives.
The below example as well as the one on the JavaScript Files section are based on the crAPI application.

Base Path
The example below is based on PostSwigger's API Testing module.
Investigate the base path of each endpoint (Figure 2 & 3).


JavaScript Files
We can use the JS Link Finder Burp extension to search within the JavaScript files for patterns that suggest API endpoints (Figure 4).

Last updated
Was this helpful?