Grep tips for Javascript Analysis
๐ฃExtracting JavaScript Files from recursive Directories
๐ฃSearching for API Keys and Secrets
๐ฃDetecting Dangerous Function Calls
๐ฃChecking for URL Manipulation
๐ฃSearching for Cross-Origin Requests
๐ฃAnalyzing postMessage Usage
๐ฃFinding Hardcoded URLs or Endpoints
๐ฃLocating Debugging Information
๐ฃInvestigating User Input Handling
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #JS
๐กNote: cat * is for all files from the folder.
๐ฃExtracting JavaScript Files from recursive Directories
find /path/to/your/folders -name "*.js" -exec mv {} /path/to/target/folder/ \;
๐ฃSearching for API Keys and Secrets
cat * | grep -rE "apikey|api_key|secret|token|password|auth|key|pass|user"
๐ฃDetecting Dangerous Function Calls
cat * | grep -rE "eval|document\.write|innerHTML|setTimeout|setInterval|Function"
๐ฃChecking for URL Manipulation
cat * | grep -rE "location\.href|location\.replace|location\.assign|window\.open"
๐ฃSearching for Cross-Origin Requests
cat * | grep -rE "XMLHttpRequest|fetch|Access-Control-Allow-Origin|withCredentials" /path/to/js/files
๐ฃAnalyzing postMessage Usage
cat * | grep -r "postMessage"
๐ฃFinding Hardcoded URLs or Endpoints
cat * | grep -rE "https?://|www\."
๐ฃLocating Debugging Information
cat * | grep -rE "console\.log|debugger|alert|console\.dir"
๐ฃInvestigating User Input Handling
cat * | grep -rE "document\.getElementById|document\.getElementsByClassName|document\.querySelector|document\.forms"
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #JS
โค3