[Logger++](https://portswigger.net/bappstore/470b7057b86f41c396a97903377f3d81) is a multithreaded logging extension for Burp Suite. This extension allows advanced filters to be defined to highlight interesting entries or filter logs to only those which match the filter.
*`Request.Path CONTAINS "api" or Request.Host CONTAINS "api"`
* Example: /api/v1/users, api.target.com/v1/users
*`Request.Path CONTAINS "v1"`: Change the "v" based on logged requests
* GraphQL
*`Request.Path CONTAINS "graphql"`
* Example: /api/graphql
-----
**API Operations**
* REST
* Read (Example: GET /api/users)
*`Request.Method == "GET"`
* Create (Example: POST /api/users)
*`Request.Method == "POST"`
* Update (Example: PUT /api/users/1)
*`Request.Method == "PUT"`
* Delete (Example: DELETE api/users/1)
*`Request.Method == "DELETE"`
* Create, Update, Delete
*`Request.Method IN ["POST","PUT","DELETE"]`
* API Endpoint + Different API Operations (Example: GET /v1/users)
* Filter GET Requests in this API: `Request.Method == "GET" AND Request.Path CONTAINS "v1"`
* GraphQL
* Read (Query)
*`!(Request.Body CONTAINS "mutation" or Request.Body CONTAINS "subscription")`
* Create, Update, Delete (Mutation)
*`Request.Body CONTAINS "mutation"`
-----
**Cheat Sheet for finding API vulnerability by logger++ filters**
* **SSRF**
*`(Request.Query MATCHES ".*(http%3A%2F%2F|https%3A%2F%2F)?(www.)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,5}.*" OR Request.Body MATCHES ".*(http%3A%2F%2F|https%3A%2F%2F)?(www.)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,5}.*")`
* **Open Redirect**
*`(Request.Query MATCHES ".*(http%3A%2F%2F|https%3A%2F%2F)?(www.)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,5}.*" OR Request.Body MATCHES ".*(http%3A%2F%2F|https%3A%2F%2F)?(www.)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,5}.*") AND Response.Status IN [301,302]`
* **API Key Disclosure**
*`Response.Body CONTAINS "apiKey" AND Response.Headers CONTAINS "application/javascript"`