Migrating from 42Crunch to middleBrick for Base64 and cipher bypass testing
What middleBrick covers
- Black-box API scanning with under one minute scan time
- Risk score A–F with prioritized findings
- Detection of JWT and authentication misconfigurations
- Base64-encoded key and secret leakage detection
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
- CI/CD integration via GitHub Action and programmatic API
Overview of migration from 42Crunch to middleBrick
Migrating from 42Crunch to middleBrick changes how Base64 and cipher bypass testing is initiated and reported. In 42Crunch, these checks are part of a broader policy evaluation tied to proprietary profiles. With middleBrick, you submit a target URL and receive a risk score from A to F, with prioritized findings mapped to OWASP API Top 10 (2023).
middleBrick is a black-box scanner that requires no agents, SDKs, or code access. It supports any language, framework, or cloud deployment. Scan duration is under one minute and uses read-only methods plus text-only POST for LLM probes.
Base64 and cipher bypass detection capabilities
middleBrick does not test for implementation bugs in cryptographic libraries, but it does probe for weak configurations and insecure handling of encoded or transformed values that can lead to bypass scenarios.
- Detects JWT misconfigurations such as alg=none, weak algorithms like HS256 where key exposure is plausible, expired tokens, missing claims, and sensitive data placed inside claims.
- Identifies API key leakage patterns including Base64-encoded keys in URLs, headers, or body fields, and recognizes common key formats from services such as AWS, Stripe, GitHub, and Slack.
- Surfaces error and stack-trace leakage that can expose encoding or cipher routines, giving clues about how transformations are processed server-side.
- Validates the presence and correctness of security headers and WWW-Authenticate compliance, which can otherwise hide weak cipher or encoding usage.
- Maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023) to help you prepare for audits and control validation.
Authentication and authorization coverage for migration scenarios
If your 42Crunch workflows included authenticated scans, you can replicate similar coverage in middleBrick using Bearer tokens, API keys, Basic auth, and cookies.
Authenticated scanning in middleBrick requires domain verification via DNS TXT record or an HTTP well-known file, ensuring only the domain owner can submit credentials. The scanner forwards a restricted set of headers, including Authorization, X-API-Key, Cookie, and X-Custom-* headers.
For API definitions, middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution. It cross-references the spec against runtime behavior to highlight undefined security schemes, deprecated operations, and missing pagination or authorization rules. This helps you compare expected versus actual security surface when migrating from 42Crunch.
What to rebuild in your workflow
When migrating from 42Crunch, you will need to rebuild parts of your workflow that depended on its proprietary policy engine and fixed test profiles. middleBrick focuses on detection and reporting, not on fixing, patching, blocking, or remediating issues.
You should plan to:
- Map 42Crunch policy rules to the 12 detection categories in middleBrick, such as Authentication, BOLA / IDOR, BFLA / Privilege Escalation, and LLM / AI Security.
- Recreate CI/CD gate logic using the middleBrick GitHub Action, which fails the build when the score drops below your chosen threshold.
- Replace 42Crunch dashboard views with the middleBrick Web Dashboard for scan management, score trends, and branded compliance PDF generation.
- Use the CLI command
middlebrick scan <url>for local testing or scripting, with JSON or text output.
Note that middleBrick does not perform active SQL injection or command injection testing, does not detect blind SSRF, and does not replace a human pentester for high-stakes audits.
Operational differences and reporting changes
The output format and alerting model differ from 42Crunch. middleBrick delivers a risk score and prioritized findings, with remediation guidance included for each issue.
For continuous monitoring, Pro tier subscriptions support scheduled rescans every 6 hours, daily, weekly, or monthly. diff detection highlights new findings, resolved findings, and score drift. Alerts are rate-limited to one email per hour per API. HMAC-SHA256 signed webhooks are provided, with auto-disable after 5 consecutive failures.
Compliance reporting is framed as aiding preparation and providing audit evidence for PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). It does not claim certified or guaranteed compliance with any regulatory framework.