Initial Setup#
This API Hacking System blog post is specially made for Kali Linux
Update#
1
| sudo apt update -y && sudo apt upgrade -y && sudo apt dist-upgrade -y && sudo apt autoremove -y
|
Git, Go & Python#
1
2
3
| sudo apt install git -y
sudo apt install golang -y
sudo apt install python3 -y
|
Browsers#
Google Chrome#
1
2
| sudo wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb
sudo apt install ./google-chrome-stable_current_amd64.deb
|
Mozilla Firefox#
FoxyProxy#
FoxyProxy is an advanced proxy management tool that completely replaces Firefox’s limited proxying capabilities
For Chrome: Download |
For Firefox: Download
mitmproxy2swagger#
Automagically reverse-engineer REST APIs via capturing traffic
1
| sudo pip3 install mitmproxy2swagger
|
Postman#
An API platform for building and using APIs
1
2
3
| sudo wget https://dl.pstmn.io/download/latest/linux64 -O postman-linux-x64.tar.gz
sudo tar -xvzf postman-linux-x64.tar.gz -C /opt
sudo ln -s /opt/Postman/Postman /usr/bin/postman
|
Zed Attack Proxy#
OWASP ZAP is an open-source web application security scanner
1
| sudo apt install zaproxy -y
|
Miscellaneous#
Amass#
In-depth Attack Surface Mapping and Asset Discovery
1
2
| mkdir $HOME/.config/amass
curl https://raw.githubusercontent.com/OWASP/Amass/master/examples/config.ini >$HOME/.config/amass/config.ini
|
Arjun#
HTTP Parameter Discovery Suite
1
| sudo apt install arjun -y
|
A toolkit for testing, tweaking and cracking JSON Web Tokens
1
2
3
4
5
6
| cd /opt/
sudo git clone https://github.com/ticarpi/jwt_tool.git
cd jwt_tool
python3 -m pip install termcolor cprint pycryptodomex requests
sudo chmod +x jwt_tool.py
sudo ln -s /opt/jwt_tool/jwt_tool.py /usr/bin/jwt_tool
|
Kiterunner#
Contextual Content Discovery Tool
1
2
3
4
5
| cd /opt/
sudo git clone https://github.com/assetnote/kiterunner.git
cd kiterunner
sudo make build
sudo ln -s $(pwd)/dist/kr /usr/local/bin/kr
|
Nikto#
Wfuzz#
Wordlists#
Assetnote#
You can download all of the wordlists at once, using the following command:
1
| wget -r --no-parent -R "index.html*" https://wordlists-cdn.assetnote.io/data/ -nH
|
Hacking-APIs#
https://github.com/hAPI-hacker/Hacking-APIs/tree/main/Wordlists
SecLists#
SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
1
| sudo apt install seclists -y
|
Wordlists#
The wordlists from kali-defaults
1
| sudo apt install wordlists -y
|
You can find it here: /usr/share/wordlists/
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
| root@kali:~# wordlists -h
> wordlists ~ Contains the rockyou wordlist
/usr/share/wordlists
|-- amass -> /usr/share/amass/wordlists
|-- brutespray -> /usr/share/brutespray/wordlist
|-- dirb -> /usr/share/dirb/wordlists
|-- dirbuster -> /usr/share/dirbuster/wordlists
|-- dnsmap.txt -> /usr/share/dnsmap/wordlist_TLAs.txt
|-- fasttrack.txt -> /usr/share/set/src/fasttrack/wordlist.txt
|-- fern-wifi -> /usr/share/fern-wifi-cracker/extras/wordlists
|-- john.lst -> /usr/share/john/password.lst
|-- legion -> /usr/share/legion/wordlists
|-- metasploit -> /usr/share/metasploit-framework/data/wordlists
|-- nmap.lst -> /usr/share/nmap/nselib/data/passwords.lst
|-- rockyou.txt.gz
|-- seclists -> /usr/share/seclists
|-- sqlmap.txt -> /usr/share/sqlmap/data/txt/wordlist.txt
|-- wfuzz -> /usr/share/wfuzz/wordlist
└── wifite.txt -> /usr/share/dict/wordlist-probable.txt
|