Information security is a dynamic science, and staying up to date with it is no easy task. New technologies emerge all the time, and with them come new vulnerabilities, new flaws, and different types of attacks that appear in the blink of an eye.

In this context, we have APIs (Application Programming Interfaces). This mechanism allows two programs to communicate following a set of rules and protocols without needing to know each other beforehand. It's known that over 90% of developers use APIs; often, you don't see them, you don't notice them, but they're behind the scenes, doing their job. However, it's a targeted layer and susceptible to attacks from malicious users.

Given this context, APIsec University emerges as an educational institution focused on API security, which makes this very clear on its website: APIsec University was founded with a simple yet powerful mission: to make world-class API security education accessible to everyone, regardless of their background or financial situation.

APIsec offers certified courses, lectures, workshops, tools, and several free courses. I've already taken almost all of them. 😎

Check them out, here:

When we start an API penetration test, the first thing we analyze is the documentation: knowing what the API does, its workflow, and its parameters is fundamental to proceeding with the tests. Then, we perform a reconnaissance of the API's resources, endpoints, token type, etc., and based on this, we can create a JSON file, called a Collection, that includes requests, authorizations, HTTP headers, and even examples of responses to specific requests.

But not all that glitters is gold. We find APIs with incomplete documentation, or no documentation at all; APIs that use other APIs; APIs with forgotten versioning; and in these cases, we have to perform reverse engineering on the application to create a Collection file, a kind of mapping of the entire API flow.

To help us with this task, mapping the flow of an API, APIsec created a tool called BOLT, an add-on for Google Chrome.

APIsec BOLT automatically discovers APIs by capturing real application traffic directly from your browser — without proxies, agents, or configuration.

As you interact with an application, BOLT identifies API endpoints, generates OpenAPI (Swagger) specifications, and provides a streamlined path to analyze and test those APIs using APIsec.ai.

But this tool can do much more:

Build the API inventory you're missing from real, observed behavior. Seed test plans and automation with live endpoints + parameters. Accelerate BOLA/BOPLA hunts by mapping object/parameter access quickly. Generate specs for governance when teams haven't published OpenAPI.

The add-on is available on the Chrome Web Store:

More information about her:

Once Bolt is installed in Chrome, access the website of your interest; in this case, I installed a vulnerable application called crAPI, available at:

With the online crAPI, activate BOLT. When BOLT starts, it automatically detects the domain currently in your browser. If you want BOLT to capture only traffic from that domain, check the "Capture only base-url" box. If you want to capture all traffic, uncheck this box. Now just click the "Start Capture" button to start BOLT.

None
Screenshot crAPI and BOLT.

As you browse the site, fill out forms, add purchases, etc., BOLT will capture all traffic coming from the domain, as simple as that, without needing a proxy.

None
BOLT capturing traffic.

Once finished, click "Stop" to end the capture. Note: The "Stop" button now becomes the "New" button, should you wish to start a new capture.

We have three tabs in BOLT: traffic, params, swagger, and search.

None
Tabs and search.

In the "Traffic" tab, we have all the captured traffic, as the name suggests, but we also have two more options, GET and POST, which can be selected if you want to display only one of the suggested methods. Here we can see that we have 72 requests divided into 47 GETs and 25 POSTs:

None
"Traffic" tab.

In the right corner of each request, we can see three symbols:

None
Three symbols on the right.
  1. Flag, a color marker to highlight specific requests:
None
None

2. Hacker, to open the manipulator. Here you can edit the request as you see fit, in both "Form" and "Raw" formats:

  • to choose HTTP methods;
  • to delete or to add parameters;
  • to delete, to add, or to modify headers;
  • to add and to remove body content.

After editing, click "Send", and you will see the response below in "Response".

None
None

We can export the request as a cURL command by clicking the "cURL" button, of course:

None
cURL command created by BOLT.

3. A downward-pointing arrow allows you to expand the request and view its full content.

The following tab, "Params," shows the parameters involved in the requests:

You can sort them by Query, Body, or Header.

None
Excerpt from the "params" tab.

The next tab is "Swagger" (UI), a list of resources available in the API and the operations that can be called on those resources.

In the right corner of each request, we can see two symbols:

None
Two symbols on the right.

The hacker and the downward-pointing arrow, whose functions we already know.

None
"Swagger" tab, part expanded.

Finally, we have the "Analyze" button, which, when clicked, will create a new tab called "apis".

None
"apis" tab.

This BOLT function groups requests by service.

None
Grouping by services.

Click the arrow to the left to expand it.

None
Content of a group.

By clicking the "Onboard" button, you will need to register with APIsec to submit data for analysis.

None
APIsec access panel.

Between us, registration is free! 😉

I won't go into the analysis in this article; maybe that'll be for the next one.

And finally, and as always, last but not least, the bottom bar:

From left to right, we have:

None
Bottom bar of the BOLT.
  1. BOLT version;
  2. privacy terms;
  3. OAS, to export as an OpenAPI Specifications file;
  4. to export a JSON file;
  5. settings (registration) wheel;
  6. Moon, choose a theme, light or dark.

As we can see, BOLT is a very useful tool for API testing, promoting fast and efficient testing.

APIsec has been striving to help everyone with API security issues, so if you have tested BOLT, please give them feedback and tell them about your experience with BOLT.

PS: At the time this article was published, BOLT was at version 1.3.1.