API Hunting to Employee PII Data
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容。看起来这篇文章是关于API模糊测试的,作者分享了他发现API漏洞的过程。 文章提到作者提交了一个API漏洞后,决定搜索他最喜欢的品牌的漏洞赏金计划。他使用了subfinder工具来找子域名,发现了一个有趣的子域名ghost.company.com,并进一步探索发现了新的API漏洞。整个过程只花了几个小时。 用户的需求是用中文总结内容,控制在100字以内。所以我要抓住关键点:作者发现API漏洞的过程、使用的工具、子域名的探索以及时间投入。 接下来,我需要把这些信息浓缩成简洁的句子,确保不超过100字。同时,避免使用“文章内容总结”之类的开头,直接描述内容。 最后检查一下是否符合要求:字数、语言、结构是否合适。确保信息准确传达,并且流畅自然。 </think> 作者分享了一次API漏洞挖掘经历,通过使用subfinder工具快速扫描目标公司的子域名,在发现一个新上线的子域名后进一步探索并发现了新的API漏洞。整个过程仅花费数小时。 2026-3-15 14:17:16 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Fuzzing on APIs

SIDDHANT SHUKLA

Read for Freee..ee👈

Shinji

Hunters🐺,

I have a new API Hacking write-up to share with you, this one is really crazy because it’s just take some hours to find this API bug. You can read about other API Bugs:

I am not consistent with my hunting write-ups because of my recent job but thanks whoever reading my write-ups.

Introduction

Just after submitting API bug to my regular bug bounty program, I have decided to search for one of my faviourite brand bug bounty program and It turns out they have self-hosted bug bounty program.

I picked the global subdomain and ran subfinder for quick subdomains of the global subdomain:

subfinder -d company.com --all --recursive | anew subs.txt

I have got so many subdomains but one of them looks intersting let’s say it’s ghost.company.com, and I quickly opened this subdomain domain in my browser and It turns out this is a very new subdomain of this company.


文章来源: https://infosecwriteups.com/api-hunting-to-employee-pii-data-638866e3f494?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh