root💀bl4ck4non-sec:~#

Hack. Eat. Sleep. Repeat!!!

View on GitHub

Lab: Username enumeration via different responses


Task

image

So this lab is vulnerable to username enumeration and password brute-force attacks. We’ll need the wordlist provided when it is time to bruteforce

Navigate to the website,

image image

Lets login with something random, then we capture the request using burpsuite and send it over to burp intruder

image image

Now that we have the captured request, we can go ahead to insert a payload marker

image image

Now, lets configure our payloads, for the first payload set, we’ll copy the content of the candidate usernames provided to us in this lab

image

For the second payload set, we’ll copy the content of the candidate passwords provided to us in this lab

image

Now we can start the attack after configuring both payloads

image

We can see that the status code and length for that request is actually different. Lets try to login with this creds

username:vagrant password:hunter

image image

We have successfully solved this lab


Lab: Username enumeration via subtly different responses


Task

image

Our task is to access this account by performing a valid username enumeration and bruteforce the user’s password

Navigate to the webpage

image image

Lets login with something random, then we capture the request using burpsuite and send it over to burp intruder

image image

Now that we have the captured request, we can go ahead to insert a payload marker

image

Now, lets configure our payloads, for the first payload set, we’ll copy the content of the candidate usernames provided to us in this lab

image

For the second payload set, we’ll copy the content of the candidate passwords provided to us in this lab

image

Now we can start the attack after configuring both payloads