top of page

LinkFinder - A Python Script That Finds Endpoints In JavaScript Files

  • Writer: Security Unleashed
    Security Unleashed
  • Jul 29, 2018
  • 1 min read

Updated: Aug 1, 2018


LinkFinder is a python script written to discover endpoints and their parameters in JavaScript files. This way penetration testers and bug hunters are able to gather new, hidden endpoints on the websites they are testing. Resulting in new testing ground, possibility containing new vulnerabilities. It does so by using jsbeautifier for python in combination with a fairly large regular expression. The regular expressions consists of four small regular expressions. These are responsible for finding:


Full URLs (https://cybertechops.com/*)

Absolute URLs or dotted URLs (/* or ../*)

Relative URLs with atleast one slash (text/test.php)

Relative URLs without a slash (test.php)


The output is given in HTML.


Installation

$ cd LinkFinder

$ python setup.py install


Dependencies

LinkFinder depends on the requests, argparse, jsbeautifier and requests-file python modules. These dependencies can all be installed using pip.


Usage

Examples

1. Most basic usage to find endpoints in an online JavaScript file and output the results to results.html:


linkfinder -i https://cybertechops.com/1.js -o results.html


2. CLI ouput (doesn't use jsbeautifier, which makes it very fast):


linkfinder -i https://cybertechops.com/1.js -o cli


3. Burp input (select in target the files you want to save, right click, Save selected items, feed that file as input):


linkfinder -i -i burpfile -b


4. Enumerating an entire folder for JavaScript files, while looking for endpoints starting with /api/ and finally saving the results to results.html:


linkfinder -i 'Desktop/*.js' -r ^/api/ -o results.html


Comments


©2019 Security Unleashed 

bottom of page