System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Follow publication

Member-only story

How i was able get get 6 api key and Leak 800K Custmore info

Imran Niaz
System Weakness
Published in
3 min readOct 7, 2024

--

They never imagined or thought that we would go to a certain place and hack their server.
A week ago, our company colleagues told us that we needed to integrate with a third-party CRM. We were somewhat happy because we were supposed to get a bonus for this work, and that’s why we agreed to do it.
Things took a turn when we didn’t receive the bonus, and one of our senior colleagues noticed that we were fetching data without a password. They weren’t very aware of this matter.

We had seen a technique on the internet that explained how you can log in through cookies, so we understood that by saving everything in a variable, we could fetch the data.
When our boss saw this, he went there and had a meeting with them about what was going on.

Photo by HackerNoon on Unsplash

They said it was nothing, just cookies, and that we were using them. However, the issue is that when you bring the API, we will accept you.

When we had completed all the work, we realized that yes, we could do this because we had done it three times before. However, when we looked into it and saw that this was happening, we had been keeping an eye on that opposing company for quite a while. We thought, let’s check their website because they were showing this data in their CRM.

We suspected that the developers they had weren’t very experienced, as they had made many mistakes in the code. They were using a third-party CRM, which was a large company and generally very secure, but these people weren’t secure because their directories were open, and they had embedded API keys directly in JavaScript in many places.

When we realized that they had placed all these keys in JavaScript, we managed to grab the API and retrieved the documentation for that CRM from the internet.
Once we obtained the documentation, we found out that all the data was coming from there. We discussed this with…

--

--

Published in System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Written by Imran Niaz

I hope you all are well. My name is Imran Niaz. I like to see such things related to technology and global politics. They are changing the society ..