I'm always excited to connect with professionals, collaborate on cybersecurity projects, or share insights.

Social Links

Status
Loading...
Bug Bounty

Discover Hidden Parameters for Web App Vulnerabilities πŸ”πŸ•΅οΈβ€β™‚οΈ

Discover Hidden Parameters for Web App Vulnerabilities πŸ”πŸ•΅οΈβ€β™‚οΈ

Introduction

In the ever-evolving realm of cybersecurity, the quest to unveil hidden parameters within web applications takes center stage. Armed with powerful tools like Arjun and Waybackurls, security enthusiasts, penetration testers, and bug bounty hunters gain a comprehensive toolkit for identifying potential vulnerabilities. In this guide, we embark on an in-depth exploration of these methods, providing step-by-step insights to elevate your web security endeavors.

Arjun Method

Installation

Ensure you have Arjun installed on your machine by executing the following command:

sudo apt install arjun -y

Usage

Explore Arjun's capabilities by checking its help menu

arjun -h

Β 

To analyze a specific URL for hidden parameters, use the following command:

arjun -u http://example.com/

Β 

Arjun offers flexibility by allowing you to specify the type of request data to search for, such as GET, POST, or JSON parameters

arjun -u http://example.com/ --get
arjun -u http://example.com/ --post
arjun -u http://example.com/ --json

Β 

Extend your exploration by providing a list of multiple URLs or utilizing a custom wordlist for parameter names:

arjun --urls urls.txt
arjun -u http://example.com/ -f parameters.txt

Β 

Customize the number of threads and the delay between requests for optimal performance:

arjun -u http://example.com/ -t 16
arjun -u http://example.com/ -d 5
arjun -u http://example.com/ --stable

Β 

Save and analyze results in JSON format:

arjun -u http://example.com/ -o results.json

Β 

Waybackurls Method

Installation

For the second method, leverage the capabilities of Waybackurls . Install it with the following command:

go install github.com/tomnomnom/waybackurls@latest

Usage

Create a file containing the target domain:

echo domain.com | waybackurls | tee URLs.txt

Β 

Filter URLs with parameters to create a focused list

cat URLs.txt | grep =$ >> parameters.txt

Β 

Conclusion

Arjun and Waybackurls emerge as indispensable allies in discovering hidden parameters. Whether you're a seasoned penetration tester or a security enthusiast, these methods provide detailed insights into potential vulnerabilities within web applications. As you navigate the intricate landscape of web security, incorporate these techniques into your arsenal, fortifying your defenses and staying one step ahead of potential threats.

If you have any questions about this tutorial please leave a comment below or reach out to me on TwitterΒ @amrelsagaei . Happy hunting!

Β 

2 min read
Mar 25, 2024
By Amr Elsagaei
Share

Leave a comment

Your email address will not be published. Required fields are marked *

Related posts

May 10, 2025 β€’ 2 min read
JavaScript Analysis Masterclass - Part 1
May 02, 2025 β€’ 2 min read
Inside the Mind of a $Million Bug Bounty Hunter | SecMeet 0x01
Jan 21, 2025 β€’ 2 min read
Hacker vs. ChatGPT! Who Wins?