Dodanki za Firefox Browser
  • Rozšyrjenja
  • Drastwy
    • za Firefox
    • Słowniki a rěcne pakśiki
    • Druge sedła wobglědowaka
    • Dodanki za Android
Pśizjawiś
Pśeglěd za JSONPeek

JSONPeek wót Hacks and Hops

Passively identify JSONP endpoints as you browse with the ability to send suspected endpoints to an exploit server for validation.

0 (0 reviews)0 (0 reviews)
17 wužywarjow17 wužywarjow
Trjebaśo Firefox, aby toś to rozšyrjenje wužywał
Firefox ześěgnuś a rozšyrjenje wobstaraś
Dataju ześěgnuś

Metadaty rozšyrjenja

Fota wobrazowki
The JSONPeek popupThe exploit server testing a provided URLAn alert box firing which indicates the endpoint is in fact JSONP
Wó toś tom rozšyrjenju
Code
This addon is free and open-source software (FOSS) all code can be found here: https://github.com/ACK-J/JSONPeek/
Please report your bugs or feature requests in a GitHub issue instead of in a review.

Test if it works!
https://www.w3schools.com/js/tryit.asp?filename=tryjson_jsonp_callback

This addon passively listens for network requests which include GET parameters commonly used by JSONP endpoints. The extension popup will show you any of these detected requests. Clicking on a request in the popup will open the JSONP endpoint in a new tab for you to play around with. Additionally, there is an "exploit" button that sends the suspected JSONP url to my webserver to check if it is exploitable. The source code for the webserver can be found HERE. Multiple proof of concepts are attempted with check marks indicating success and an X indicating failure.

Why do I want to find JSONP endpoints?
The most common way to bypass a content security policy (CSP) is by finding a JSONP endpoint on a trusted domain within the CSP. JSONP takes advantage of the fact that the same-origin policy does not prevent execution of external <script> tags. Usually, a <script src="some/js/file.js"> tag represents a static script file. But you can just as well create a dynamic API endpoint, say /userdata, and have it accept a query parameter (such as ?callback=CALLBACK) which dynamically specifies a JavaScript function.

When would I need a CSP Bypass?
A Content Security Policy (CSP) bypass may be necessary in specific scenarios, typically related to web security testing or development. CSP is a security feature that helps prevent a range of attacks like Cross-Site Scripting (XSS), data injection attacks, and clickjacking by controlling which resources the browser is allowed to load and execute.

Donations
  • Monero Address: 89jYJvX3CaFNv1T6mhg69wK5dMQJSF3aG2AYRNU1ZSo6WbccGtJN7TNMAf39vrmKNR6zXUKxJVABggR4a8cZDGST11Q4yS8
Z 0 wót 0 pógódnośujucych pógódnośony
Pśizjawśo se, aby toś to rozšyrjenje pógódnośił
Hyšći pógódnośenja njejsu

Gwězdowe pógódnośenje jo se składło

5
0
4
0
3
0
2
0
1
0
Hyšći žedne pógódnośenja
Pšawa a datyDalšne informacije

Trjebne pšawa:

  • Pśistup k rejtarikam wobglědowaka měś
  • Pśistup k wašym datam za wšykne websedła měś
Dalšne informacije
Dodankowe wótzkaze
  • Sedło pomocy
Wersija
1.3
Wjelikosć
78,46 KB
Slědny raz zaktualizěrowany
24 dagar sidan (28. juli 2025)
Pśiswójźbne kategorije
  • Webwuwiśe
  • Priwatnosć a wěstota
Licenca
Jano licenca GNU General Public License v3.0
Wersijowa historija
  • Wšykne wersije pokazaś
Zběrce pśidaś
Toś ten dodank k wěsći daś
Wersijowe informacije za 1.3
  • removed reliance on jsonpeek.com
Wěcej rozšyrjenjow wót Hacks and Hops
  • Hyšći pógódnośenja njejsu

  • Hyšći pógódnośenja njejsu

  • Hyšći pógódnośenja njejsu

  • Hyšći pógódnośenja njejsu

  • Hyšći pógódnośenja njejsu

  • Hyšći pógódnośenja njejsu

K startowemu bokoju Mozilla

Dodanki

  • Wó nas
  • Blog dodankow Firefox
  • Źěłowa kupka rozšyrjenjow
  • Wuwijaŕski rožk
  • Wuwijaŕske pšawidła
  • Blog zgromaźeństwa
  • Forum
  • Programowu zmólku k wěsći daś
  • Směrnica za pógódnośenja

Wobglědowaki

  • Desktop
  • Mobile
  • Enterprise

Produkty

  • Browsers
  • VPN
  • Relay
  • Monitor
  • Pocket
  • Bluesky (@firefox.com)
  • Instagram (Firefox)
  • YouTube (firefoxchannel)
  • Priwatnosć
  • Cookieje
  • Pšawniske

Jolic nic hynac zapisane, se wopśimjeśe na toś tom sedle pód Creative Commons Attribution Share-Alike License v3.0 abo póznjejšeju wersiju licencěrujo.