Overview
The Spider Phase uses a combination of human researchers and AI crawlers to maximize coverage:Human Researchers
Use the Burp Extension to capture traffic from manual exploration of complex workflows.
ECHO-01 Crawler
AI-powered crawler that navigates applications intelligently and discovers hidden endpoints.
Spider Modes
- Quick
- Standard
- Deep
Duration: 15-30 minutesFast surface mapping for rapid assessment. Best for:
- Known applications with simple architecture
- Quick verification scans
- CI/CD pipeline integration
What Gets Discovered
Endpoints & URLs
Endpoints & URLs
- All accessible pages and routes
- REST API endpoints
- GraphQL operations
- WebSocket connections
- Hidden admin panels
Parameters & Inputs
Parameters & Inputs
- Query string parameters
- POST body fields
- HTTP headers
- Cookie values
- File upload points
Application Flows
Application Flows
- Authentication sequences
- Multi-step forms
- State machine transitions
- Business workflows
Technology Stack
Technology Stack
- Framework detection
- Server identification
- JavaScript libraries
- API patterns (REST, GraphQL, gRPC)
Burp Extension Integration
Capture authenticated sessions and complex user flows:1
Install Extension
Download and install the Indie Security Burp extension from the dashboard.Download Extension →
2
Connect to Session
Enter your API key and target ID to link the extension with your assessment.
3
Capture Traffic
Browse your application normally. All traffic is captured and sent to the knowledge graph.
4
Mark Auth Flows
Use the extension to mark login sequences so the AI can replicate authentication.
Spider Results
After completion, you’ll have access to:Surface Map
Visual representation of discovered endpoints and their relationships.
Parameter Inventory
Complete list of all discovered input points.
Tech Stack Report
Identified technologies, frameworks, and potential attack vectors.
Coverage Metrics
Statistics on pages visited, endpoints found, and code coverage.
Best Practices
Next Steps
Once the Spider Phase completes, proceed to the Analysis Phase:Analysis Phase
Begin AI-powered vulnerability testing on your mapped surface.