# Blazor Pentesting

Blazor is a web framework for building interactive web applications using C# instead of JavaScript.

### Common Directories/Files <a href="#common-directoriesfiles" id="common-directoriesfiles"></a>

```
# This file contains paths of DLLs that can be reversed.
/_framework/blazor.boot.json
/_framework/<Example>.dll
```

### Reverse Engineering DLLs <a href="#reverse-engineering-dlls" id="reverse-engineering-dlls"></a>

We can reverse DLLs such as `/_framework/<Example>.dll` using tools such as **DotPeek** for retrieving sensitive information (credentials, software versions, etc.).

If you use DotPeek, right-click on the name in Assembly Explorer and click **Decompiled Sources** for investigation.
