✈️ I Tried Hacking a Flight Booking API — Here’s What I Found (or Didn’t )
文章描述了一次针对航班预订平台的渗透测试,利用代理和多种攻击手段(如价格操纵和仿冒联盟)尝试低价购票。尽管后端未被攻破,但过程值得记录。 2025-9-10 05:51:8 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Varnith

“Can you hack your way to a $5.50 flight to New York?”
That’s what I set out to explore — armed with a proxy, curiosity, and way too much coffee.

Free Article Link Here

Welcome to my deep dive into a real-world pentesting session targeting a flight booking platform (name redacted for responsible disclosure). This wasn’t a wild zero-day fest, but a structured, methodical test that explored some juicy attack surfaces — price manipulation, affiliate spoofing, token abuse, replay attacks — the usual suspects in the bug bounty lineup.

Spoiler: The backend held strong. But the ride? Oh, it was worth documenting.

Recon & First Signs of Fun🕵️‍♂️

My target? Let’s call it SkyJet — an airline booking brand with several regional flavors (think SkyJetUS, SkyJetNL, BudgetFly, etc).

While poking around their frontend, I noticed the booking flow made multiple API calls that looked like this:

  • /edge/order/ace – cart/order creation
  • /edge/order/pax – passenger details
  • /edge/order/payment – payment setup

What caught my eye were the custom headers being passed along:

  • Affiliate-Internal-Code
  • Brand
  • Cid
  • Checkout-Session

文章来源: https://infosecwriteups.com/%EF%B8%8F-i-tried-hacking-a-flight-booking-api-heres-what-i-found-or-didn-t-bc4391b57d41?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh