Online
Brute force on online services.
Unlike offline cracking, the online attack must take into consideration:
Lockout threshold
Possible attempts before being blocked
Lockout duration
Duration of the block
Lockout observation window
After how long does the reset of attempts occur
Website
Get the data (index.php, usr, pas, and “Login failed. Invalid”) by analyzing the http request.
To find usernames take into consideration:
Login form
Registration form (to use the same email: dot s.t.u.d.e.n.t@gmail.com, tag student+htb@gmail.com)
Password reset form
Check cookie (ex. cookie named “failed_login” only when the user name is valid.)
Response time (use long password)
Status codes
Error messages
Blocking of attempts only if made on an existing username
Bypass Account Locking
Search for headers that bypass IP blocking (ex.
X-Forwarded-For
)Try a correct login on your account to reset attempts (with macro in Burp set max 1 concurrent requests)
Last updated