the home site for me: also iteration 3 or 4 of my site
1+++ 2title = "Airbuds" 3date = 2024-12-16 4slug = "airbuds" 5description = "Trying to break their api." 6draft = true 7 8[taxonomies] 9tags = ["reverse engineering", "graphql"] 10+++ 11 12Recently my cousin introduced me to the [Airbuds](https://airbuds.fm) app. Naturally I used it for a little bit. Slept a bit. And then booted up Proxypin to see if I could extract phone numbers from the app. With the base requests it appeared that I couldn't (:sadge:). I could get my phone number for my own profile however so I knew that it was likely stored in a user record somewhere (editor kieran: *umm yeah duh*). The more interesting part of this though was that it was a graphql api. 13 14<!-- more --> 15 16## Phase 2 17 18Now knowing that it had a graphql api I wanted to see if there was a way to reverse engineer it. I have had suprisingly little experience with them but doing some quick ducking revealed that they can potentially have introspection enabled allowing us to get a full schema of what we can get. That sounds awesome but hopefully from a security standpoint unlikely to be enabled.