Concepts

The Security Lifecycle

Understanding the automated multi-stage process WSHawk uses to uncover vulnerabilities.

01

Heuristic Discovery

WSHawk begins by establishing a baseline connection. It monitors initial handshakes and outgoing messages to infer the message protocol (JSON, XML, Protobuf) and schema structure.

bash
1[*] Initializing baseline connection to ws://target.com/api [*] Analyzed message: {'user_id': 101, 'action': 'get_profile'} [+] Format detected: JSON (Dynamic Schema)
02

Adaptive Mutation

Once fields are identified, the Payload Mutator generates thousands of variations. It doesn't just spray-and-pray; it adapts based on server response headers (like X-WAF-System) to bypass active filters.

Encoding

URL, Hex, Base64, and Double-encoding to bypass simple regex filters.

Comment Injection

Breaking SQL and Script tags using server-specific comment syntax.

03

OAST & Out-of-Band Probing

For blind vulnerabilities, WSHawk deploys "Beacons" that trigger callbacks to our OAST provider. This allows detection of vulnerabilities that don't result in immediate console errors or status code changes.

python
1# WSHawk OAST Trigger # Payload: <img src='https://interact.sh/callback?id=XSS_123'> # Result: [ALERT] XSS Callback Received from Proxy IP 1.2.3.4
04

Headless Verification

To eliminate false positives, suspected XSS or DOM injections are re-validated in a Playwright-driven headless browser. Only if the payload executes in a real browser environment is it reported as a vulnerability.